##
Updated at UTC 2025-07-01T15:03:28.469367
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-6554 | 8.1 | 0.02% | 11 | 0 | 2025-07-01T14:15:41.410000 | Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote at | |
| CVE-2025-49490 | 5.4 | 0.04% | 2 | 0 | 2025-07-01T12:31:05 | Resource leak vulnerability in ASR180x in router allows Resource Leak Exposure. | |
| CVE-2025-49492 | 7.4 | 0.04% | 2 | 0 | 2025-07-01T12:31:05 | Out-of-bounds write in ASR180x in lte-telephony, May cause a buffer underrun. | |
| CVE-2025-49483 | 5.4 | 0.04% | 2 | 0 | 2025-07-01T12:15:23.827000 | Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in tr069 | |
| CVE-2025-49482 | 5.4 | 0.04% | 2 | 0 | 2025-07-01T12:15:23.703000 | Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in tr069 | |
| CVE-2025-49481 | 5.4 | 0.04% | 2 | 0 | 2025-07-01T12:15:23.577000 | Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in route | |
| CVE-2025-49480 | 7.4 | 0.04% | 2 | 0 | 2025-07-01T12:15:22.923000 | Out-of-bounds access in ASR180x 、ASR190x in lte-telephony, This vulnerability | |
| CVE-2025-49491 | 5.4 | 0.04% | 2 | 0 | 2025-07-01T11:15:21.520000 | Improper Resource Shutdown or Release vulnerability in ASR Falcon_Linux、Kestrel、 | |
| CVE-2025-49488 | 5.4 | 0.04% | 2 | 0 | 2025-07-01T11:15:20.790000 | Improper Resource Shutdown or Release vulnerability in ASR180x 、ASR190x in route | |
| CVE-2025-49489 | 5.4 | 0.04% | 2 | 0 | 2025-07-01T10:15:28.910000 | Improper Resource Shutdown or Release vulnerability in ASR Falcon_Linux、Kestrel、 | |
| CVE-2025-41648 | 9.8 | 0.06% | 4 | 0 | 2025-07-01T09:30:40 | An unauthenticated remote attacker can bypass the login to the web application o | |
| CVE-2025-41656 | 10.0 | 0.10% | 3 | 0 | 2025-07-01T09:30:40 | An unauthenticated remote attacker can run arbitrary commands on the affected de | |
| CVE-2025-6934 | 9.8 | 0.06% | 1 | 1 | 2025-07-01T09:30:40 | The Opal Estate Pro – Property Management and Submission plugin for WordPress, u | |
| CVE-2025-5072 | 5.4 | 0.04% | 2 | 0 | 2025-07-01T09:15:23.430000 | Resource leak vulnerability in ASR180x、ASR190x in con_mgr allows Resource Leak E | |
| CVE-2025-49521 | 8.8 | 0.08% | 2 | 0 | 2025-07-01T03:31:37 | A flaw was found in the EDA component of the Ansible Automation Platform, where | |
| CVE-2025-6824 | 8.8 | 0.18% | 2 | 0 | 2025-07-01T03:31:37 | A vulnerability classified as critical has been found in TOTOLINK X15 up to 1.0. | |
| CVE-2025-49520 | 8.8 | 0.08% | 2 | 0 | 2025-07-01T03:31:36 | A flaw was found in Ansible Automation Platform’s EDA component where user-suppl | |
| CVE-2025-26074 | 9.8 | 0.12% | 1 | 0 | 2025-06-30T22:16:54 | Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS command | |
| CVE-2025-45931 | 9.8 | 0.27% | 3 | 0 | 2025-06-30T21:31:52 | An issue D-Link DIR-816-A2 DIR-816A2_FWv1.10CNB05_R1B011D88210 allows a remote a | |
| CVE-2025-32462 | 2.8 | 0.02% | 5 | 0 | 2025-06-30T21:30:54 | Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that i | |
| CVE-2025-6916 | 8.8 | 0.06% | 2 | 1 | 2025-06-30T21:15:32.730000 | A vulnerability, which was classified as critical, was found in TOTOLINK T6 4.1. | |
| CVE-2025-32463 | 9.3 | 0.01% | 12 | 3 | 2025-06-30T21:15:30.257000 | Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswi | |
| CVE-2025-6734 | 8.8 | 0.04% | 2 | 0 | 2025-06-30T18:38:48.477000 | A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been rate | |
| CVE-2025-47824 | 2.0 | 0.01% | 1 | 0 | 2025-06-30T18:38:48.477000 | Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have c | |
| CVE-2025-47821 | 2.2 | 0.01% | 1 | 0 | 2025-06-30T18:38:48.477000 | Flock Safety Gunshot Detection devices before 1.3 have a hardcoded password for | |
| CVE-2025-3699 | 9.8 | 0.17% | 2 | 0 | 2025-06-30T18:38:48.477000 | Missing Authentication for Critical Function vulnerability in Mitsubishi Electri | |
| CVE-2025-6886 | 8.8 | 0.09% | 3 | 0 | 2025-06-30T18:38:23.493000 | A vulnerability has been found in Tenda AC5 15.03.06.47 and classified as critic | |
| CVE-2025-6881 | 8.8 | 0.04% | 2 | 0 | 2025-06-30T18:38:23.493000 | A vulnerability was found in D-Link DI-8100 16.07.21. It has been rated as criti | |
| CVE-2025-6898 | 6.3 | 0.50% | 2 | 0 | 2025-06-30T18:38:23.493000 | A vulnerability, which was classified as critical, has been found in D-Link DI-7 | |
| CVE-2025-53391 | 9.3 | 0.01% | 1 | 0 | 2025-06-30T18:38:23.493000 | The Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through the zulucrypt_6. | |
| CVE-2025-24290 | 9.9 | 0.03% | 1 | 0 | 2025-06-30T18:38:23.493000 | Multiple Authenticated SQL Injection vulnerabilities found in UISP Application ( | |
| CVE-2025-3248 | None | 92.39% | 1 | 18 | template | 2025-06-30T14:54:13 | Langflow versions prior to 1.3.0 are susceptible to code injection in the /api/v |
| CVE-2025-6899 | 6.3 | 0.50% | 2 | 0 | 2025-06-30T09:30:35 | A vulnerability, which was classified as critical, was found in D-Link DI-7300G+ | |
| CVE-2025-6896 | 6.3 | 0.50% | 2 | 0 | 2025-06-30T09:30:30 | A vulnerability classified as critical has been found in D-Link DI-7300G+ 19.12. | |
| CVE-2025-6897 | 5.5 | 0.55% | 2 | 0 | 2025-06-30T09:30:30 | A vulnerability classified as critical was found in D-Link DI-7300G+ 19.12.25A1. | |
| CVE-2025-6887 | 8.8 | 0.09% | 2 | 0 | 2025-06-30T06:30:33 | A vulnerability was found in Tenda AC5 15.03.06.47 and classified as critical. A | |
| CVE-2025-6019 | 7.0 | 0.02% | 3 | 3 | 2025-06-30T03:31:34 | A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Gener | |
| CVE-2025-6882 | 8.8 | 0.04% | 2 | 0 | 2025-06-30T03:30:39 | A vulnerability classified as critical has been found in D-Link DIR-513 1.0. Thi | |
| CVE-2025-6825 | 8.8 | 0.14% | 2 | 0 | 2025-06-28T21:30:35 | A vulnerability classified as critical was found in TOTOLINK A702R up to 4.0.0-B | |
| CVE-2025-45729 | 6.3 | 0.03% | 2 | 0 | 2025-06-27T21:31:30 | D-Link DIR-823-Pro 1.02 has improper permission control, allowing unauthorized u | |
| CVE-2025-6618 | 6.3 | 2.28% | 2 | 0 | 2025-06-27T18:31:47 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been classified | |
| CVE-2025-6621 | 6.3 | 2.28% | 2 | 0 | 2025-06-27T18:31:47 | A vulnerability classified as critical has been found in TOTOLINK CA300-PoE 6.2c | |
| CVE-2025-6619 | 6.3 | 2.28% | 2 | 0 | 2025-06-27T18:31:47 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been declared a | |
| CVE-2025-49853 | 9.1 | 0.05% | 1 | 0 | 2025-06-27T18:31:47 | ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to SQL | |
| CVE-2025-6522 | 5.4 | 0.03% | 1 | 0 | 2025-06-27T18:30:51 | Unauthenticated users on an adjacent network with the Sight Bulb Pro can run sh | |
| CVE-2025-6568 | 8.8 | 0.17% | 2 | 0 | 2025-06-27T18:30:43 | A vulnerability classified as critical has been found in TOTOLINK EX1200T 4.1.2c | |
| CVE-2025-6620 | 6.3 | 2.28% | 2 | 0 | 2025-06-27T18:11:26.180000 | A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as c | |
| CVE-2024-51978 | 9.8 | 2.68% | 4 | 1 | template | 2025-06-27T15:32:26 | An unauthenticated attacker who knows the target device's serial number, can gen |
| CVE-2025-6705 | None | 0.04% | 1 | 0 | 2025-06-27T15:31:41 | On open-vsx.org http://open-vsx.org/ it was possible to run an arbitrary build | |
| CVE-2024-54085 | 9.8 | 9.47% | 3 | 1 | 2025-06-27T12:32:19 | AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authe | |
| CVE-2025-6751 | 8.8 | 0.08% | 2 | 0 | 2025-06-27T06:31:22 | A vulnerability, which was classified as critical, was found in Linksys E8450 up | |
| CVE-2025-6752 | 8.8 | 0.08% | 2 | 0 | 2025-06-27T06:31:22 | A vulnerability has been found in Linksys WRT1900ACS, EA7200, EA7450 and EA7500 | |
| CVE-2025-47819 | 6.4 | 0.02% | 1 | 0 | 2025-06-27T03:30:47 | Flock Safety Gunshot Detection devices before 1.3 have an on-chip debug interfac | |
| CVE-2025-47822 | 6.4 | 0.02% | 1 | 0 | 2025-06-27T03:30:47 | Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have a | |
| CVE-2025-47823 | 2.2 | 0.01% | 1 | 0 | 2025-06-27T03:30:47 | Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have a | |
| CVE-2025-47818 | 2.2 | 0.01% | 1 | 0 | 2025-06-27T03:30:41 | Flock Safety Gunshot Detection devices before 1.3 have a hard-coded password for | |
| CVE-2025-6732 | 8.8 | 0.04% | 2 | 0 | 2025-06-27T00:32:15 | A vulnerability was found in UTT HiPER 840G up to 3.1.1-190328. It has been clas | |
| CVE-2025-6561 | 9.8 | 0.08% | 1 | 0 | 2025-06-26T21:31:28 | Certain hybrid DVR models ((HBF-09KD and HBF-16NK)) from Hunt Electronic have an | |
| CVE-2025-6627 | 8.8 | 0.16% | 2 | 0 | 2025-06-26T21:31:22 | A vulnerability has been found in TOTOLINK A702R 4.0.0-B20230721.1521 and classi | |
| CVE-2025-6543 | None | 14.77% | 15 | 2 | 2025-06-26T21:31:20 | Memory overflow vulnerability leading to unintended control flow and Denial of S | |
| CVE-2025-6617 | 8.8 | 0.09% | 2 | 0 | 2025-06-26T21:31:20 | A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. | |
| CVE-2025-6614 | 8.8 | 0.09% | 2 | 0 | 2025-06-26T21:31:20 | A vulnerability, which was classified as critical, has been found in D-Link DIR- | |
| CVE-2025-6615 | 8.8 | 0.09% | 2 | 0 | 2025-06-26T21:31:13 | A vulnerability, which was classified as critical, was found in D-Link DIR-619L | |
| CVE-2025-20282 | 10.0 | 0.14% | 6 | 0 | 2025-06-26T21:31:13 | A vulnerability in an internal API of Cisco ISE and Cisco ISE-PIC could allow an | |
| CVE-2025-32977 | 9.7 | 0.02% | 1 | 0 | 2025-06-26T21:31:13 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
| CVE-2025-32978 | 7.5 | 0.06% | 1 | 0 | 2025-06-26T21:31:13 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
| CVE-2025-23265 | 7.8 | 0.02% | 1 | 0 | 2025-06-26T21:31:13 | NVIDIA Megatron-LM for all platforms contains a vulnerability in a python compon | |
| CVE-2025-49151 | 9.1 | 0.11% | 1 | 0 | 2025-06-26T21:31:13 | MICROSENS NMP Web+ could allow an unauthenticated attacker to generate forged JS | |
| CVE-2025-20264 | 6.4 | 0.07% | 1 | 0 | 2025-06-26T21:31:12 | A vulnerability in the web-based management interface of Cisco Identity Services | |
| CVE-2025-23260 | 5.0 | 0.03% | 1 | 0 | 2025-06-26T21:31:10 | NVIDIA AIStore contains a vulnerability in the AIS Operator where a user may gai | |
| CVE-2025-6565 | 8.8 | 0.19% | 2 | 0 | 2025-06-26T21:31:09 | A vulnerability was found in Netgear WNCE3001 1.0.0.50. It has been classified a | |
| CVE-2025-36537 | 7.0 | 0.01% | 2 | 0 | 2025-06-26T21:31:09 | Incorrect Permission Assignment for Critical Resource in the TeamViewer Client ( | |
| CVE-2025-6560 | 9.8 | 0.11% | 2 | 0 | 2025-06-26T21:31:08 | Multiple wireless router models from Sapido have an Exposure of Sensitive Inform | |
| CVE-2025-6559 | 9.8 | 0.62% | 2 | 0 | 2025-06-26T21:31:08 | Multiple wireless router models from Sapido have an OS Command Injection vulnera | |
| CVE-2025-32975 | 10.0 | 0.12% | 1 | 0 | 2025-06-26T21:31:08 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
| CVE-2025-34034 | None | 0.05% | 1 | 0 | 2025-06-26T21:31:08 | A hardcoded credential vulnerability exists in the Blue Angel Software Suite dep | |
| CVE-2025-20281 | 9.8 | 0.14% | 6 | 1 | 2025-06-26T20:35:07.773000 | A vulnerability in a specific API of Cisco ISE and Cisco ISE-PIC could allow an | |
| CVE-2025-34037 | 0 | 2.46% | 2 | 0 | 2025-06-26T18:58:14.280000 | An OS command injection vulnerability exists in various models of E-Series Links | |
| CVE-2025-48469 | 9.6 | 0.04% | 2 | 0 | 2025-06-26T18:58:14.280000 | Successful exploitation of the vulnerability could allow an unauthenticated atta | |
| CVE-2025-52570 | 0 | 0.06% | 1 | 0 | 2025-06-26T18:58:14.280000 | Letmein is an authenticating port knocker. Prior to version 10.2.1, The connecti | |
| CVE-2025-32976 | 8.8 | 0.10% | 1 | 0 | 2025-06-26T18:58:14.280000 | Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef | |
| CVE-2025-34041 | 0 | 1.03% | 1 | 0 | 2025-06-26T18:58:14.280000 | An OS command injection vulnerability exists in the Chinese versions of Sangfor | |
| CVE-2025-23264 | 7.8 | 0.02% | 1 | 0 | 2025-06-26T18:58:14.280000 | NVIDIA Megatron-LM for all platforms contains a vulnerability in a python compon | |
| CVE-2025-6616 | 8.8 | 0.09% | 2 | 0 | 2025-06-26T18:57:43.670000 | A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as crit | |
| CVE-2025-34049 | 0 | 0.50% | 2 | 0 | 2025-06-26T18:57:43.670000 | An OS command injection vulnerability exists in the OptiLink ONT1GEW GPON router | |
| CVE-2025-36038 | 9.0 | 0.24% | 1 | 0 | 2025-06-26T18:57:43.670000 | IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to ex | |
| CVE-2025-49153 | 9.8 | 0.22% | 1 | 0 | 2025-06-26T18:57:43.670000 | MICROSENS NMP Web+ could allow an unauthenticated attacker to overwrite files a | |
| CVE-2025-34043 | None | 0.32% | 2 | 0 | 2025-06-26T18:31:35 | A remote command injection vulnerability exists in Vacron Network Video Recorder | |
| CVE-2025-6709 | 7.5 | 0.09% | 7 | 0 | 2025-06-26T18:31:35 | The MongoDB Server is susceptible to a denial of service vulnerability due to im | |
| CVE-2025-34044 | None | 0.09% | 2 | 0 | 2025-06-26T18:31:34 | A remote command injection vulnerability exists in the confirm.php interface of | |
| CVE-2025-34048 | None | 0.22% | 2 | 0 | 2025-06-26T18:31:34 | A path traversal vulnerability exists in the web management interface of D-Link | |
| CVE-2025-34042 | None | 0.52% | 2 | 0 | 2025-06-26T18:31:34 | An authenticated command injection vulnerability exists in the Beward N100 IP Ca | |
| CVE-2024-11584 | 5.9 | 0.01% | 1 | 0 | 2025-06-26T18:31:26 | cloud-init through 25.1.2 includes the systemd socket unit cloud-init-hotplugd.s | |
| CVE-2024-6174 | 8.8 | 0.02% | 1 | 0 | 2025-06-26T18:31:25 | When a non-x86 platform is detected, cloud-init grants root access to a hardcode | |
| CVE-2025-6402 | 8.8 | 0.16% | 2 | 0 | 2025-06-25T20:14:57.620000 | A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been decl | |
| CVE-2025-6372 | 8.8 | 0.03% | 2 | 0 | 2025-06-25T20:09:56.243000 | A vulnerability, which was classified as critical, was found in D-Link DIR-619L | |
| CVE-2025-6370 | 8.8 | 0.03% | 2 | 0 | 2025-06-25T20:09:39.790000 | A vulnerability classified as critical was found in D-Link DIR-619L 2.06B01. Aff | |
| CVE-2025-6369 | 8.8 | 0.03% | 2 | 0 | 2025-06-25T20:09:28.010000 | A vulnerability classified as critical has been found in D-Link DIR-619L 2.06B01 | |
| CVE-2025-6218 | 7.8 | 0.65% | 8 | 3 | 2025-06-25T19:03:33.817000 | RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vuln | |
| CVE-2025-49851 | None | 0.07% | 1 | 0 | 2025-06-24T21:30:36 | ControlID iDSecure On-premises versions 4.7.48.0 and prior are vulnerable to an | |
| CVE-2025-2566 | None | 0.13% | 1 | 0 | 2025-06-24T21:30:36 | Kaleris NAVIS N4 ULC (Ultra Light Client) contains an unsafe Java deserializatio | |
| CVE-2025-5087 | None | 0.02% | 1 | 0 | 2025-06-24T21:30:35 | Kaleris NAVIS N4 ULC (Ultra Light Client) communicates insecurely using zlib-com | |
| CVE-2025-44531 | 7.5 | 0.05% | 1 | 0 | 2025-06-24T21:30:28 | An issue in Realtek RTL8762EKF-EVB RTL8762E SDK v1.4.0 allows attackers to cause | |
| CVE-2024-56731 | 10.0 | 0.33% | 2 | 0 | 2025-06-24T19:00:21 | ### Summary Due to the insufficient patch for the CVE-2024-39931, it's still pos | |
| CVE-2025-6545 | None | 0.09% | 1 | 0 | 2025-06-23T22:41:52 | ### Summary This affects both: 1. Unsupported algos (e.g. `sha3-256` / `sha3-5 | |
| CVE-2025-4563 | 2.7 | 0.02% | 2 | 0 | 2025-06-23T22:41:42 | A vulnerability exists in the NodeRestriction admission controller where nodes c | |
| CVE-2025-6400 | 8.8 | 0.17% | 2 | 0 | 2025-06-23T21:31:56 | A vulnerability was found in TOTOLINK N300RH 6.1c.1390_B20191101 and classified | |
| CVE-2025-6399 | 8.8 | 0.17% | 2 | 0 | 2025-06-23T21:31:56 | A vulnerability, which was classified as critical, was found in TOTOLINK X15 1.0 | |
| CVE-2025-6374 | 8.8 | 0.03% | 2 | 0 | 2025-06-23T21:31:56 | A vulnerability was found in D-Link DIR-619L 2.06B01 and classified as critical. | |
| CVE-2025-4981 | 9.9 | 0.23% | 1 | 0 | 2025-06-23T20:16:40.143000 | Mattermost versions 10.5.x <= 10.5.5, 9.11.x <= 9.11.15, 10.8.x <= 10.8.0, 10.7. | |
| CVE-2025-6511 | 8.8 | 0.19% | 2 | 0 | 2025-06-23T20:16:21.633000 | A vulnerability classified as critical has been found in Netgear EX6150 1.0.0.46 | |
| CVE-2025-34024 | 0 | 0.64% | 2 | 0 | 2025-06-23T20:16:21.633000 | An OS command injection vulnerability exists in the Edimax EW-7438RPn firmware v | |
| CVE-2025-50054 | 5.5 | 0.01% | 1 | 0 | 2025-06-23T18:31:23 | Buffer overflow in OpenVPN ovpn-dco-win version 1.3.0 and earlier and version 2. | |
| CVE-2025-6510 | 8.8 | 0.19% | 2 | 0 | 2025-06-23T18:30:33 | A vulnerability was found in Netgear EX6100 1.0.2.28_1.1.138. It has been rated | |
| CVE-2025-6393 | 8.8 | 0.65% | 2 | 0 | 2025-06-23T15:31:43 | A vulnerability was found in TOTOLINK A702R, A3002R, A3002RU and EX1200T 3.0.0-B | |
| CVE-2025-6486 | 8.8 | 0.14% | 2 | 0 | 2025-06-22T18:30:39 | A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been d | |
| CVE-2025-6487 | 8.8 | 0.14% | 2 | 0 | 2025-06-22T18:30:31 | A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been r | |
| CVE-2025-6371 | 8.8 | 0.06% | 2 | 0 | 2025-06-21T00:30:38 | A vulnerability, which was classified as critical, has been found in D-Link DIR- | |
| CVE-2025-6368 | 8.8 | 0.03% | 2 | 0 | 2025-06-21T00:30:37 | A vulnerability was found in D-Link DIR-619L 2.06B01. It has been rated as criti | |
| CVE-2025-6373 | 8.8 | 0.03% | 2 | 0 | 2025-06-21T00:30:37 | A vulnerability has been found in D-Link DIR-619L 2.06B01 and classified as crit | |
| CVE-2025-49132 | 10.0 | 23.69% | 2 | 5 | template | 2025-06-20T22:21:17 | ## Impact Using the `/locales/locale.json` with the `locale` and `namespace` qu |
| CVE-2025-34029 | None | 1.10% | 2 | 0 | 2025-06-20T21:32:14 | An OS command injection vulnerability exists in the Edimax EW-7438RPn Mini firmw | |
| CVE-2025-6367 | 8.8 | 0.03% | 2 | 0 | 2025-06-20T21:32:14 | A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as cr | |
| CVE-2025-34022 | None | 0.26% | 2 | 0 | 2025-06-20T21:32:13 | A path traversal vulnerability exists in multiple models of Selea Targa IP OCR-A | |
| CVE-2025-34021 | None | 0.06% | 2 | 0 | 2025-06-20T21:32:13 | A server-side request forgery (SSRF) vulnerability exists in multiple Selea Targ | |
| CVE-2025-49825 | 9.8 | 0.24% | 3 | 0 | 2025-06-18T14:15:12 | ### Impact A full technical disclosure and open-source patch will be published | |
| CVE-2025-5349 | 0 | 0.03% | 2 | 0 | 2025-06-17T20:50:23.507000 | Improper access control on the NetScaler Management Interface in NetScaler ADC a | |
| CVE-2025-5777 | None | 0.06% | 16 | 1 | 2025-06-17T15:31:16 | Insufficient input validation leading to memory overread on the NetScaler Manage | |
| CVE-2025-36852 | None | 0.04% | 1 | 0 | 2025-06-10T21:31:31 | A critical security vulnerability exists in remote cache extensions for common b | |
| CVE-2024-47081 | 5.3 | 0.06% | 1 | 0 | 2025-06-09T19:06:12 | ### Impact Due to a URL parsing issue, Requests releases prior to 2.32.4 may le | |
| CVE-2025-20130 | 4.9 | 0.04% | 1 | 0 | 2025-06-05T20:12:23.777000 | A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE | |
| CVE-2024-6866 | 5.3 | 0.05% | 1 | 0 | 2025-05-17T18:55:58 | corydolphin/flask-cors version 5.0.1 contains a vulnerability where the request | |
| CVE-2024-6844 | 5.3 | 0.05% | 1 | 0 | 2025-05-17T18:54:45 | A vulnerability in corydolphin/flask-cors version 5.0.1 allows for inconsistent | |
| CVE-2025-0133 | 0 | 2.28% | 1 | 4 | template | 2025-05-16T14:43:56.797000 | A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gatew |
| CVE-2025-4679 | 6.5 | 0.05% | 1 | 0 | 2025-05-16T09:30:42 | A vulnerability in Synology Active Backup for Microsoft 365 allows remote authen | |
| CVE-2023-20198 | 10.0 | 94.03% | 1 | 30 | template | 2025-05-15T18:37:33.893000 | Cisco is providing an update for the ongoing investigation into observed exploit |
| CVE-2021-40444 | 8.8 | 94.29% | 1 | 42 | 2025-04-04T20:46:47.360000 | <p>Microsoft is investigating reports of a remote code execution vulnerability i | |
| CVE-2025-1974 | 9.8 | 87.05% | 1 | 22 | template | 2025-03-27T16:45:46.410000 | A security issue was discovered in Kubernetes where under certain conditions, an |
| CVE-2024-6839 | 4.3 | 0.05% | 1 | 0 | 2025-03-20T10:15:33.743000 | corydolphin/flask-cors version 4.0.1 contains an improper regex path matching vu | |
| CVE-2025-1767 | 6.5 | 0.04% | 1 | 0 | 2025-03-14T17:30:07 | A security vulnerability was discovered in Kubernetes that could allow a user wi | |
| CVE-2023-28771 | 9.8 | 94.35% | 3 | 2 | 2025-03-13T16:16:59.950000 | Improper error message handling in Zyxel ZyWALL/USG series firmware versions 4.6 | |
| CVE-2022-22965 | 9.8 | 94.46% | 1 | 99 | template | 2025-01-29T18:38:40 | Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code exec |
| CVE-2025-0056 | 6.0 | 0.02% | 2 | 0 | 2025-01-14T03:31:48 | SAP GUI for Java saves user input on the client PC to improve usability. An atta | |
| CVE-2025-0055 | 6.0 | 0.02% | 2 | 0 | 2025-01-14T03:31:48 | SAP GUI for Windows stores user input on the client PC to improve usability. Und | |
| CVE-2024-39931 | 10.0 | 0.64% | 1 | 0 | 2024-12-23T20:38:21 | ### Impact Unprivileged user accounts can execute arbitrary commands on the Gog | |
| CVE-2023-0386 | 7.8 | 57.63% | 2 | 14 | 2024-06-27T12:30:43 | A flaw was found in the Linux kernel, where unauthorized access to the execution | |
| CVE-2019-6693 | 6.5 | 76.49% | 2 | 3 | 2024-04-11T21:02:46 | Use of a hard-coded cryptographic key to cipher sensitive data in FortiOS config | |
| CVE-2023-36934 | 9.1 | 92.23% | 1 | 0 | template | 2024-04-04T05:23:52 | In Progress MOVEit Transfer before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021. |
| CVE-2023-34362 | 9.8 | 94.48% | 1 | 11 | template | 2024-04-04T04:29:06 | In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0. |
| CVE-2024-0769 | 5.3 | 75.22% | 2 | 0 | 2024-01-21T09:30:39 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DIR-859 1.06 | |
| CVE-2025-53095 | 0 | 0.02% | 1 | 0 | N/A | ||
| CVE-2025-49144 | 0 | 0.01% | 5 | 5 | N/A | ||
| CVE-2025-47812 | 0 | 0.00% | 1 | 1 | N/A | ||
| CVE-2025-52562 | 0 | 1.48% | 1 | 0 | N/A | ||
| CVE-2025-53094 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2025-53091 | 0 | 0.07% | 1 | 0 | N/A | ||
| CVE-2024-21969 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-48703 | 0 | 0.00% | 2 | 2 | N/A | ||
| CVE-2025-52566 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2025-6018 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2025-52464 | 0 | 0.06% | 1 | 0 | N/A |
updated 2025-07-01T14:15:41.410000
11 posts
Updated today:
NIST: High severity CVE-2025-6554 https://nvd.nist.gov/vuln/detail/CVE-2025-6554
The Hacker New: Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update https://thehackernews.com/2025/07/google-patches-critical-zero-day-flaw.html @thehackernews #Google #cybersecurity #Infosec #Chrome #zeroday
##"Google is aware that an exploit for CVE-2025-6554 exists in the wild," the browser vendor said in a security advisory issued on Monday. https://www.bleepingcomputer.com/news/security/google-fixes-fourth-actively-exploited-chrome-zero-day-of-2025/
##Chrome in crisis: a dangerous zero-day in its V8 engine was exploited in the wild—but Google moved fast to patch it. Did your browser make it through the breach?
#cve20256554
#chromevulnerability
#cybersecurity
#zeroday
#googlesecurity
🔎 Chrome pre-138.0.7204.96 hit by HIGH severity type confusion (CVE-2025-6554) in V8. Remote attackers can read/write memory via malicious HTML. Patch now! https://radar.offseq.com/threat/cve-2025-6554-type-confusion-in-google-chrome-3352da1d #OffSeq #Chrome #Vulnerability #CVE20256554
##Chrome patched a sev:HIGH CVE with an ITW exploit.
Google is aware that an exploit for CVE-2025-6554 exists in the wild.
https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html
##Updated today:
NIST: High severity CVE-2025-6554 https://nvd.nist.gov/vuln/detail/CVE-2025-6554
The Hacker New: Chrome Zero-Day CVE-2025-6554 Under Active Attack — Google Issues Security Update https://thehackernews.com/2025/07/google-patches-critical-zero-day-flaw.html @thehackernews #Google #cybersecurity #Infosec #Chrome #zeroday
##"Google is aware that an exploit for CVE-2025-6554 exists in the wild," the browser vendor said in a security advisory issued on Monday. https://www.bleepingcomputer.com/news/security/google-fixes-fourth-actively-exploited-chrome-zero-day-of-2025/
##Google patches actively exploited Chrome (CVE‑2025‑6554) https://www.helpnetsecurity.com/2025/07/01/google-patches-actively-exploited-chrome-cve-2025-6554/ #securityupdate #MicrosoftEdge #Don'tmiss #Hotstuff #Vivaldi #Chrome #0-day #Brave #Opera #News
##Chrome patched a sev:HIGH CVE with an ITW exploit.
Google is aware that an exploit for CVE-2025-6554 exists in the wild.
https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop_30.html
##updated 2025-07-01T12:31:05
2 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T12:31:05
2 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T12:15:23.827000
2 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T12:15:23.703000
2 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T12:15:23.577000
2 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T12:15:22.923000
2 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T11:15:21.520000
2 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T11:15:20.790000
2 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T10:15:28.910000
2 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T09:30:40
4 posts
July is starting off with a perfect 10 in some OT kit. 🥳
https://certvde.com/en/advisories/VDE-2025-045/
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.
https://nvd.nist.gov/vuln/detail/CVE-2025-41656
https://certvde.com/en/advisories/VDE-2025-039/
sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.
🚨 CVE-2025-41648 (CRITICAL, CVSS 9.8): Pilz IndustrialPI 4 w/ webstatus lets remote attackers bypass authentication & change all settings. No patch yet—segment networks & monitor traffic. Details: https://radar.offseq.com/threat/cve-2025-41648-cwe-704-incorrect-type-conversion-o-ea121f93 #OffSeq #ICS #Vulnerability #OTSecurity
###OT #Advisory VDE-2025-039
Pilz: Authentication Bypass in IndustrialPI Webstatus
#CVE CVE-2025-41648
https://certvde.com/en/advisories/VDE-2025-039
#CSAF https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-003.json
##July is starting off with a perfect 10 in some OT kit. 🥳
https://certvde.com/en/advisories/VDE-2025-045/
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.
https://nvd.nist.gov/vuln/detail/CVE-2025-41656
https://certvde.com/en/advisories/VDE-2025-039/
sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.
updated 2025-07-01T09:30:40
3 posts
July is starting off with a perfect 10 in some OT kit. 🥳
https://certvde.com/en/advisories/VDE-2025-045/
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.
https://nvd.nist.gov/vuln/detail/CVE-2025-41656
https://certvde.com/en/advisories/VDE-2025-039/
sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.
#OT #Advisory VDE-2025-045
Pilz: Missing Authentication in Node-RED integration
#CVE CVE-2025-41656
https://certvde.com/en/advisories/VDE-2025-045
#CSAF https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2025/ppsa-2025-002.json
##July is starting off with a perfect 10 in some OT kit. 🥳
https://certvde.com/en/advisories/VDE-2025-045/
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
An unauthenticated remote attacker can run arbitrary commands on the affected devices with high privileges because the authentication for the Node_RED server is not configured by default.
https://nvd.nist.gov/vuln/detail/CVE-2025-41656
https://certvde.com/en/advisories/VDE-2025-039/
sev:CRIT 9.8 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##An unauthenticated remote attacker can bypass the login to the web application of the affected devices making it possible to access and change all available settings of the IndustrialPI.
updated 2025-07-01T09:30:40
1 posts
1 repos
⚠️ CRITICAL: CVE-2025-6934 in Opal Estate Pro plugin (<=1.7.5) lets unauth attackers register as admins on WordPress sites. Disable plugin, restrict registrations, and review accounts ASAP! https://radar.offseq.com/threat/cve-2025-6934-cwe-269-improper-privilege-managemen-c1a44303 #OffSeq #WordPress #Infosec #PrivilegeEscalation
##updated 2025-07-01T09:15:23.430000
2 posts
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
Ten CVEs in various ASR gear. They're all rated sev:HIGH by ASR, though the CVSS scores are eight sev:MED and two sev:HIGH.
https://www.asrmicro.com/en/goods/psirt?cid=40
CVE-2025-5072
CVE-2025-49489
CVE-2025-49490
CVE-2025-49491
CVE-2025-49492
CVE-2025-49488
CVE-2025-49480
CVE-2025-49481
CVE-2025-49482
CVE-2025-49483
updated 2025-07-01T03:31:37
2 posts
Post-auth sev:HIGH code injection and argument injection vulns in Ansible Automation Platform.
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
https://bugzilla.redhat.com/show_bug.cgi?id=2370812
https://nvd.nist.gov/vuln/detail/CVE-2025-49520
##A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
Post-auth sev:HIGH code injection and argument injection vulns in Ansible Automation Platform.
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
https://bugzilla.redhat.com/show_bug.cgi?id=2370812
https://nvd.nist.gov/vuln/detail/CVE-2025-49520
##A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
updated 2025-07-01T03:31:37
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-07-01T03:31:36
2 posts
Post-auth sev:HIGH code injection and argument injection vulns in Ansible Automation Platform.
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
https://bugzilla.redhat.com/show_bug.cgi?id=2370812
https://nvd.nist.gov/vuln/detail/CVE-2025-49520
##A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
Post-auth sev:HIGH code injection and argument injection vulns in Ansible Automation Platform.
A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
https://bugzilla.redhat.com/show_bug.cgi?id=2370812
https://nvd.nist.gov/vuln/detail/CVE-2025-49520
##A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.
updated 2025-06-30T22:16:54
1 posts
Not yet evaluated means no risk yet, right?
##Orkes Conductor v3.21.11 allows remote attackers to execute arbitrary OS commands through unrestricted access to Java classes.
updated 2025-06-30T21:31:52
3 posts
🚨 CRITICAL RCE in D-Link DIR-816-A2 routers (DIR-816A2_FWv1.10CNB05)! CVE-2025-45931 lets remote attackers run arbitrary code via the web server. No patch yet—disable WAN admin, monitor networks, and segment devices. More: https://radar.offseq.com/threat/cve-2025-45931-na-4f99a444 #OffSeq #Infosec #Vulnerability #RouterSecurity
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T21:30:54
5 posts
Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463) https://www.helpnetsecurity.com/2025/07/01/sudo-local-privilege-escalation-vulnerabilities-fixed-cve-2025-32462-cve-2025-32463/ #vulnerability #Stratascale #Don'tmiss #Hotstuff #Debian #Ubuntu #Linux #macOS #News #SUSE
##Sudo versions 1.9.14 to 1.9.17 (inclusive) have two critical vulnerabilities:
- local privilege escalation via chroot option (CVE-2025-32463) https://www.openwall.com/lists/oss-security/2025/06/30/3
- local privilege escalation via host option (CVE-2025-32462) https://www.openwall.com/lists/oss-security/2025/06/30/2
𝐬𝐮𝐝𝐨 -𝐡 𝐡𝐨𝐬𝐭
Turns out the "h" stands for "hold my beer". 🍺 😅
⬇️
Local Privilege Escalation via host option
Sudo’s host (-h or --host) option is intended to be used in conjunction with the list option (-l or --list) to list a user’s sudo privileges on a host other than the current one. However, due to a bug it was not restricted to listing privileges and could be used when running a command via sudo or editing a file with sudoedit. Depending on the rules present in the sudoers file this could allow a local privilege escalation attack.
Sudo versions 1.8.8 to 1.9.17 inclusive are affected.
👇
https://www.sudo.ws/security/advisories/host_any/
[related]
Vulnerability Advisory: Sudo Host Option Elevation of Privilege
👇
https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-sudo-host
Setting up sudo (1.9.13p3-1+deb12u2) ...
Et hop, CVE-2025-32462 ne passera pas par moi. https://tracker.debian.org/news/1649978/accepted-sudo-1913p3-1deb12u2-source-into-stable-security/
##updated 2025-06-30T21:15:32.730000
2 posts
1 repos
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T21:15:30.257000
12 posts
3 repos
https://github.com/4f-kira/CVE-2025-32463
Critical Sudo vulnerabilities enable local privilege escalation to root
The Stratascale Cyber Research Unit are reporting two vulnerabilities in the Sudo utility, including a critical flaw (CVE-2025-32463) that allows unprivileged users to escalate to root privileges through the chroot option by exploiting NSS library loading mechanisms.
**This is a nasty flaw. If you have multiple user roles on your linux systems or are running services as non-root, make sure to update your Linux systems' Sudo utility to version 1.9.17p1 or later. The exploit vector is possible if someone already has local access to the system, which can either be through direct credentials or through breaching a vulnerable service that's running as non-root.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sudo-vulnerabilities-enable-local-privilege-escalation-to-root-o-x-8-6-q/gD2P6Ple2L
Maybe controversial, but I think it is bad to do this
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
🔴 CRITICAL: CVE-2025-32463 in Sudo <1.9.17p1 lets local users escalate to root by abusing --chroot and user-controlled /etc/nsswitch.conf. Identify & patch vulnerable systems, tighten controls. https://radar.offseq.com/threat/cve-2025-32463-cwe-829-inclusion-of-functionality--c61a2c6c #OffSeq #Sudo #Linux #CVE202532463
##Turns out sudo -f was implemented as sudo -R...
https://leahneukirchen.org/blog/archive/2011/04/sudo-f.html
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
##CVE-2025-32463 Vulnerability Advisory: Sudo chroot Elevation of Privilege https://lobste.rs/s/srcfxn #linux #security
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
Sudo local privilege escalation vulnerabilities fixed (CVE-2025-32462, CVE-2025-32463) https://www.helpnetsecurity.com/2025/07/01/sudo-local-privilege-escalation-vulnerabilities-fixed-cve-2025-32462-cve-2025-32463/ #vulnerability #Stratascale #Don'tmiss #Hotstuff #Debian #Ubuntu #Linux #macOS #News #SUSE
##Critical Sudo vulnerabilities enable local privilege escalation to root
The Stratascale Cyber Research Unit are reporting two vulnerabilities in the Sudo utility, including a critical flaw (CVE-2025-32463) that allows unprivileged users to escalate to root privileges through the chroot option by exploiting NSS library loading mechanisms.
**This is a nasty flaw. If you have multiple user roles on your linux systems or are running services as non-root, make sure to update your Linux systems' Sudo utility to version 1.9.17p1 or later. The exploit vector is possible if someone already has local access to the system, which can either be through direct credentials or through breaching a vulnerable service that's running as non-root.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-sudo-vulnerabilities-enable-local-privilege-escalation-to-root-o-x-8-6-q/gD2P6Ple2L
Maybe controversial, but I think it is bad to do this
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
Turns out sudo -f was implemented as sudo -R...
https://leahneukirchen.org/blog/archive/2011/04/sudo-f.html
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
##CVE-2025-32463 Vulnerability Advisory: Sudo chroot Elevation of Privilege https://lobste.rs/s/srcfxn #linux #security
https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot
Sudo versions 1.9.14 to 1.9.17 (inclusive) have two critical vulnerabilities:
- local privilege escalation via chroot option (CVE-2025-32463) https://www.openwall.com/lists/oss-security/2025/06/30/3
- local privilege escalation via host option (CVE-2025-32462) https://www.openwall.com/lists/oss-security/2025/06/30/2
updated 2025-06-30T18:38:48.477000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T18:38:48.477000
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-30T18:38:48.477000
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-30T18:38:48.477000
2 posts
CVE-2025-3699: la puerta trasera (no intencionada) en los HVAC de Mitsubishi Electric https://www.hackplayers.com/2025/06/cve-2025-3699-Mitsubishi-Electric.html #vulnerabilidades #amenazas #IoT #OT
##Critical vulnerability exposes Mitsubishi Electric Air Conditioning Controllers to remote takeover
CISA has reported a critical vulnerability (CVE-2025-3699) in Mitsubishi Electric air conditioning control systems that allows remote unauthenticated attackers to bypass login mechanisms and gain unauthorized control over industrial HVAC infrastructure through missing authentication protections.
**If you have Mitsubishi Electric air conditioning controllers, make sure they are isolated from the internet and accessible only from trusted networks. Also make sure thar physical access to HVAC control panels is properly secured. Then contact Mitsubishi Electric for patch availability.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerability-exposes-mitsubishi-electric-air-conditioning-controllers-to-remote-takeover-v-3-9-t-4/gD2P6Ple2L
updated 2025-06-30T18:38:23.493000
3 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##🚨 HIGH severity vuln: Tenda AC5 (15.03.06.47) stack buffer overflow in /goform/openSchedWifi (CVE-2025-6886). Remote exploit public. Restrict access & monitor for fixes! https://radar.offseq.com/threat/cve-2025-6886-stack-based-buffer-overflow-in-tenda-25c90c53 #OffSeq #Vuln #IoT #Tenda
##updated 2025-06-30T18:38:23.493000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T18:38:23.493000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T18:38:23.493000
1 posts
That's kind of a fun PrivEsc.
sev:CRIT 9.3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##The Debian zuluPolkit/CMakeLists.txt file for zuluCrypt through the zulucrypt_6.2.0-1 package has insecure PolicyKit allow_any/allow_inactive/allow_active settings that allow a local user to escalate their privileges to root.
updated 2025-06-30T18:38:23.493000
1 posts
Fucking Ubiquiti showing they're the Tesla of networking yet again.
sev:CRIT 9.9 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
##Multiple Authenticated SQL Injection vulnerabilities found in UISP Application (Version 2.4.206 and earlier) could allow a malicious actor with low privileges to escalate privileges.
updated 2025-06-30T14:54:13
1 posts
18 repos
https://github.com/PuddinCat/CVE-2025-3248-POC
https://github.com/tiemio/RCE-CVE-2025-3248
https://github.com/B1ack4sh/Blackash-CVE-2025-3248
https://github.com/ill-deed/Langflow-CVE-2025-3248-Multi-target
https://github.com/0xgh057r3c0n/CVE-2025-3248
https://github.com/xuemian168/CVE-2025-3248
https://github.com/issamjr/CVE-2025-3248-Scanner
https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
https://github.com/imbas007/CVE-2025-3248
https://github.com/verylazytech/CVE-2025-3248
https://github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE
https://github.com/zapstiko/CVE-2025-3248
https://github.com/Praison001/CVE-2025-3248
https://github.com/vigilante-1337/CVE-2025-3248
https://github.com/dennisec/Mass-CVE-2025-3248
https://github.com/dennisec/CVE-2025-3248
🚨CVE-2025-3248: RCE vulnerability in Langflow
Link: https://www.zoomeye.ai/searchResult?q=YXBwPSJMYW5nZmxvdyI%3D
ZoomEye Dork: app="Langflow"
Results: 1,862
Advisory: https://github.com/advisories/GHSA-rvqx-wpfh-mfx7
PoC: https://github.com/ynsmroztas/CVE-2025-3248-Langflow-RCE
CVSS: 9.3
——————————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##updated 2025-06-30T09:30:35
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T09:30:30
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T09:30:30
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T06:30:33
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-30T03:31:34
3 posts
3 repos
https://github.com/neko205-mx/CVE-2025-6019_Exploit
Two new Linux flaws (CVE-2025-6018, CVE-2025-6019) allow local attackers to escalate to root via PAM misconfig and udisks. Exploits confirmed on Ubuntu, Fedora, Debian. Admins urged to patch immediately.
##@mina Sure. But it doesn't explain why the dash is not allowed. my example is an official CVE. Which is CVE-YEAR-Number, example: CVE-2025-6019. It is NOT CVE_2025_6019. So why is underscore allowed in a hashtag but the dash isn't? @Gargron @evan
##Yo, fellow Linuxers, #CVE20256019 has been published and updates are available. The TL;DR. A Local Privilege Escalation to root via libblockdev. Notice the local. So you need to be able to be on the machine. Still, update now.
##updated 2025-06-30T03:30:39
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-28T21:30:35
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T21:31:30
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:31:47
1 posts
Multiple vulnerabilities reported in ControlID iDSecure vehicle access control systems
ControlID has patched three critical vulnerabilities in its iDSecure On-Premises access control software, including a SQL injection flaw (CVE-2025-49853) and authentication bypass (CVE-2025-49851) that could allow attackers to gain unauthorized access to physical facilities and manipulate vehicle access systems.
**If you use ControlID iDSecure On-Premises access control software, check if it's accessible from the internet. If it is, make sure it's isolated from the internet and accessible only from trusted networks as much as possible Then plan a quick update to version 4.7.50.0. This system controls physical access to your facilities, so breaching it may get criminals access to your premises.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-controlid-idsecure-vehicle-access-control-systems-3-6-m-4-t/gD2P6Ple2L
updated 2025-06-27T18:30:51
1 posts
Internet. Of. Shit.
##Unauthenticated users on an adjacent network with the Sight Bulb Pro can run shell commands as root through a vulnerable proprietary TCP protocol available on Port 16668. This vulnerability allows an attacker to run arbitrary commands on the Sight Bulb Pro by passing a well formed JSON string.
updated 2025-06-27T18:30:43
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T18:11:26.180000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T15:32:26
4 posts
1 repos
More information on printer security, since they are often a cybersecurity blind spot!
Last week, we shared a warning about the unpatchable Brother printer vulnerability (CVE-2024-51978) that puts millions of devices at risk. If you haven’t updated your default admin passwords, do it now.
Since there was a lot of interest in this topic, we're sharing our classic, but still very relevant, on-demand webinar, "How I met your printer": https://youtu.be/b6d6RO2AFgw
@tompohl shares real-world techniques attackers use to exploit printers for initial access and lateral movement—exactly what we see in our penetration tests all the time.
If you haven’t tested your print infrastructure, now’s the time. Need help? Our pentest team can assess your network and highlight hidden vulnerabilities.
#Cybersecurity #CISO #PrinterSecurity #PenetrationTesting #LMGSecurity #NetworkSecurity #Infosec #ITsecurity
#penetrationtesting #pentest #pentesting
Hundreds of Brother printer models are affected by a critical, unpatchable vulnerability (CVE-2024-51978) that allows attackers to generate the default admin password using the device’s serial number—information that’s easily discoverable via other flaws.
748 total models across Brother, Fujifilm, Ricoh, Toshiba, and Konica Minolta are impacted, with millions of devices at risk globally.
Attackers can:
• Gain unauthenticated admin access
• Pivot to full remote code execution
• Exfiltrate credentials for LDAP, FTP, and more
• Move laterally through your network
Brother says the vulnerability cannot be fixed in firmware and requires a change in manufacturing. For now, mitigation = change the default admin password immediately.
Our pentest team regularly highlights printer security as a critical path to system compromise—and today’s news is another example that underscores this risk. This is your reminder: Printers are not “set-and-forget” devices. Treat them like any other endpoint—monitor, patch, and lock them down.
Need help testing your network for exploitable print devices? Contact us and our pentest team can help!
Read the Dark Reading article for more details on the Brother Printers vulnerability: https://www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bug
#CyberSecurity #PenetrationTesting #Pentest #Pentesting #PrinterSecurity #BrotherPrinters #CVE202451978 #Infosec #IT #SMB #CISO #Cyberaware #DFIR #ITSecurity #ZeroTrust #PatchNow #Pentest
##Although seven of the eight flaws can be patched, the aforementioned vulnerability, CVE-2024-51978, cannot. https://www.darkreading.com/endpoint-security/millions-brother-printers-critical-unpatchable-bug
##Vulnerabilities reported in Brother printers and other vendors, at least one critical
Brother Industries and four other major printer manufacturers have disclosed eight security vulnerabilities affecting 748 models of multifunction printers, including a critical authentication bypass flaw (CVE-2024-51978) that allows unauthenticated attackers to generate default administrator passwords using a predictable algorithm and cannot be fully patched through firmware updates.
**If you have Brother printers (or multifunction devices from FUJIFILM, Ricoh, Toshiba Tec, or Konica Minolta), immediately change all default administrator passwords since they probably have a flaw that allows attackers to generate these passwords and can't be fully patched. Alsom, make sure the printer are not accessible from the internet. Then apply the latest firmware updates to fix the other flaws.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/vulnerabilities-reported-in-brother-printers-at-least-one-critical-h-5-x-s-1/gD2P6Ple2L
updated 2025-06-27T15:31:41
1 posts
Researchers report flaw in Open VSX Registry that can compromise VS Code extensions marketplace
Cybersecurity researchers disclosed a critical vulnerability (CVE-2025-6705) in the Open VSX Registry that could have allowed attackers to gain complete control over the Visual Studio Code extensions marketplace by exploiting the automated publishing mechanism to steal high-privilege tokens and distribute malicious updates to millions of developer environments. The Eclipse Foundation patched the vulnerability on June 25, 2025.
**When designing your CI/CD system, review what code will it run and whether it will expose your API keys and other secrets to untrusted third party code that may be malicious. If your CI/CD will run such code, consider levels of isolation or use API keys that are for that session only with limited permissions. Yes, this is very difficult, but it's part of the complexity of running any code from anyone.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/researchers-report-flaw-in-open-vsx-registry-that-can-compromise-vs-code-extensions-marketplace-b-8-f-8-r/gD2P6Ple2L
updated 2025-06-27T12:32:19
3 posts
1 repos
CISA warns that AMI MegaRAC Vulnerability that enables server takeover is actively exploited
CISA has reported active exploitation of a maximum-severity vulnerability (CVE-2024-54085, CVSS 10.0) in AMI's MegaRAC Baseboard Management Controller software that allows unauthenticated remote attackers to completely hijack servers, deploy ransomware, and potentially cause irreversible hardware damage through malicious firmware manipulation.
**Check your servers NOW. If any of them use AMI's MegaRAC Baseboard Management Controller, make sure that the BMC is isolated in a separate network segment and only accessible only from internal trusted systems. Reach out to your server vendor for a patch, and plan a patch period. Don't ignore this one, since hackers are already exploiting this flaw.**
#cybersecurity #infosec #advisory #ransomware
https://beyondmachines.net/event_details/cisa-warns-that-ami-megarac-vulnerability-that-enables-server-takeover-is-actively-exploited-b-k-s-7-2/gD2P6Ple2L
New.
CISA has added to the KEV catalogue. The usual suspects are back.
- CVE-2024-54085: AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-54085
- CVE-2024-0769: D-Link DIR-859 Router Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-0769
- CVE-2019-6693: Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-6693 #cybersecurity #CISA #infosec
##CVE ID: CVE-2024-54085
Vendor: AMI
Product: MegaRAC SPx
Date Added: 2025-06-25
Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf ; https://security.netapp.com/advisory/ntap-20250328-0003/ ; https://nvd.nist.gov/vuln/detail/CVE-2024-54085
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-54085
updated 2025-06-27T06:31:22
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T06:31:22
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-27T03:30:47
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T03:30:47
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T03:30:47
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T03:30:41
1 posts
Hey @kajer
Flock Safety LPR (License Plate Reader) devices with firmware through 2.2 have cleartext storage of code.
https://nvd.nist.gov/vuln/detail/CVE-2025-47824
Edit to add more, including some hardcoded passwords:
https://nvd.nist.gov/vuln/detail/CVE-2025-47821
https://nvd.nist.gov/vuln/detail/CVE-2025-47822
https://nvd.nist.gov/vuln/detail/CVE-2025-47823
##updated 2025-06-27T00:32:15
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:28
1 posts
Critical flaw reported in Hunt Electronics DVR Systems exposes plaintext admin credentials
A critical vulnerability (CVE-2025-6561) in Hunt Electronics' hybrid DVR systems allows unauthenticated attackers to retrieve administrator credentials stored in plaintext through simple HTTP requests.
**If you use Hunt Electronics HBF-09KD or HBF-16NK DVR systems, make sure they are isolated from the internet. Then immediately update to firmware V3.1.70_1806 BB50604 since this flaw exposes administrator passwords in plaintext. After patching, change all administrator passwords since they may have already been compromised.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-flaw-reported-in-hunt-electronics-dvr-systems-exposes-plaintext-admin-credentials-5-1-y-d-k/gD2P6Ple2L
updated 2025-06-26T21:31:22
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:20
15 posts
2 repos
Citrix blog on CVE-2025-5777 and some other ones https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/
##Citrix blog on CVE-2025-5777 and some other ones https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/
##CVE ID: CVE-2025-6543
Vendor: Citrix
Product: NetScaler ADC and Gateway
Date Added: 2025-06-30
Notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 ; https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE-2025-6543 (citrix 🩸) hit KEV. that means confirmed exploitation with receipts. will wash dishes for payloads. bob [@] greynoise [.] io (some mastodon clients really bork email addresses) if you have'm.
##CVE-2025-5777, CVE-2025-6543: Frequently Asked Questions About CitrixBleed 2 and Citrix NetScaler Exploitation – Source: securityboulevard.com https://ciso2ciso.com/cve-2025-5777-cve-2025-6543-frequently-asked-questions-about-citrixbleed-2-and-citrix-netscaler-exploitation-source-securityboulevard-com/ #rssfeedpostgeneratorecho #SecurityBloggersNetwork #CyberSecurityNews #SecurityBoulevard
##I love how statements like:
"Currently, there is no evidence to suggest exploitation of CVE-2025-5777."
... is NOT comforting at all. It pretty much sounds just like... "we found NO vulnerabilities in our LLM-generated application".
... and how on earth would Netscaler see targeted exploitation? Exactly... Netscaler wouldn't, you might however with appropriate monitoring.
##Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC https://thehackernews.com/2025/06/citrix-releases-emergency-patches-for.html
##This new critical vulnerability, tracked as CVE-2025-6543, received a 9.2 severity score. It's a memory overflow vulnerability that can lead to unintended control flow and denial of service. https://www.theregister.com/2025/06/25/citrix_netscaler_critical_bug_exploited/
##🟥𝐋𝐂𝐒𝐂-𝐈𝐄 𝐃𝐚𝐢𝐥𝐲 𝐂𝐲𝐛𝐞𝐫 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐎𝐒𝐈𝐍𝐓 𝐒𝐡𝐚𝐫𝐞-𝟐𝟔 𝐉𝐮𝐧𝐞 𝟐𝟎𝟐𝟓🟥
𝐍𝐞𝐰𝐬:
1. Majority of Irish companies are not minimising risk of cyber attacks, according to new survey
2. First-ever cyber insurance premium decline recorded last year
https://www.cybersecuritydive.com/news/cyber-insurance-premiums-decline-am-best-report/751474/
3. Hackers breach Norwegian dam, open valve at full capacity
https://risky.biz/risky-bulletin-hackers-breach-norwegian-dam-open-valve-at-full-capacity/
https://energiteknikk.net/2025/06/hackere-apnet-ventil-pa-fullt-ved-dam-anlegg/
4. Qilin ransomware attack on UK NHS supplier contributed to patient fatality
https://www.theregister.com/2025/06/26/qilin_ransomware_nhs_death/
5. UK SMEs face rise in cyber attacks with average cost GBP £7,960
https://securitybrief.co.uk/story/uk-smes-face-rise-in-cyber-attacks-with-average-cost-gbp-7-960
6. Reasons Why 2 Million SMEs Have No Cybersecurity Training
https://cybermagazine.com/news/bt-data-warns-uk-smes-lack-cybersecurity-training
7. Insurance Europe calls for streamlining EU cybersecurity regulations
https://www.reinsurancene.ws/insurance-europe-calls-for-streamlining-eu-cybersecurity-regulations/
8. France issues press statement about arrest of ShinyHunters members
9. Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788
---
𝐆𝐥𝐨𝐛𝐚𝐥 𝐁𝐫𝐞𝐚𝐜𝐡 𝐍𝐞𝐰𝐬 𝐚𝐧𝐝 𝐃𝐚𝐭𝐚 𝐋𝐞𝐚𝐤𝐬:
1. Glasgow City Council impacted by cyber incident
https://www.glasgow.gov.uk/serviceimpact
2. Alliedbankers Insurance Corporation Allegedly Hit by Massive 80GB Data Breach
---
𝐓𝐚𝐜𝐭𝐢𝐜𝐚𝐥 𝐑𝐞𝐩𝐨𝐫𝐭𝐬 𝐰𝐢𝐭𝐡 𝐈𝐎𝐂𝐬:
1. Iranian Educated Manticore Targets Leading Tech Academics
https://research.checkpoint.com/2025/iranian-educated-manticore-targets-leading-tech-academics/
2. In the Wild: Malware Prototype with Embedded Prompt Injection
https://research.checkpoint.com/2025/ai-evasion-prompt-injection/
3. Patch and Persist: Darktrace’s Detection of Blind Eagle (APT-C-36)
4. ODYSSEY STEALER : THE REBRAND OF POSEIDON STEALER
https://www.cyfirma.com/research/odyssey-stealer-the-rebrand-of-poseidon-stealer/
5. Prolific Phishing Campaign Leveraging Zoom's Infrastructure
https://blog.reconinfosec.com/zoom-events-phishing
6. Hive0154 aka Mustang Panda shifts focus on Tibetan community to deploy Pubload backdoor
7. Gh0st RAT – Active IOCs
https://rewterz.com/threat-advisory/gh0st-rat-active-iocs-6
---
𝐓𝐡𝐫𝐞𝐚𝐭 𝐇𝐮𝐧𝐭𝐢𝐧𝐠 / 𝐃𝐅𝐈𝐑 / 𝐌𝐚𝐥𝐰𝐚𝐫𝐞:
1. Microsoft Entra ID OAuth Phishing and Detections
https://www.elastic.co/security-labs/entra-id-oauth-phishing-detection
2. Cybersecurity Stop of the Month: Adversary-in-the-Middle Attacks that Target Microsoft 365
3. OSINT Guide Pt 2: Using Telethon + Python to scrape Telegram Data
4. Top 3 Cyber Attacks in June 2025: GitHub Abuse, Control Flow Flattening, and More
https://any.run/cybersecurity-blog/cybersecurity-blog/cyber-attacks-june-2025/
5. The Case of Hidden Spam Pages
https://blog.sucuri.net/2025/06/the-case-of-hidden-spam-pages.html?web_view=true
6. Untrustworthy Trust Builders: Account Operators Replicating Trust Attack (AORTA)
7. New BRAODO Stealer Campaign Abuses GitHub To Host Payloads And Evade Detection
https://cybersecuritynews.com/new-braodo-stealer-campaign-abuses-github/
8. Setup for Maldev on android
https://medium.com/@lord_murak/setup-for-maldev-on-android-b1ee7cc307cb
9. Anomaly Detection in .onion Traffic Using Machine Learning
---
𝐋𝐢𝐠𝐡𝐭 𝐑𝐞𝐚𝐝𝐢𝐧𝐠:
1. How Foreign Scammers Use U.S. Banks to Fleece Americans
https://www.propublica.org/article/pig-butchering-scam-cybercrime-us-banks-money-laundering
2. Threat Brief: Escalation of Cyber Risk Related to Iran
https://unit42.paloaltonetworks.com/iranian-cyberattacks-2025/
3. A brief overview of the main incidents in industrial cybersecurity. Q1 2025
4. China Cyber Espionage Against Russia Is Telling About Adversary Partnerships
5. Charming Kitten APT Tries Spying on Israeli Cybersecurity Experts
https://www.darkreading.com/threat-intelligence/iran-apt-spying-israeli-cybersecurity-experts
6. Cybercriminal abuse of large language models
https://blog.talosintelligence.com/cybercriminal-abuse-of-large-language-models/
---
##Citrix releases emergency patches for actively exploited vulnerability in NetScaler Products
Citrix has patched a critical actively exploited vulnerability (CVE-2025-6543) in NetScaler ADC and Gateway products that security experts suspect enables code execution despite being characterized as denial-of-service. Citrix has also patched two other critical flaws including one compared to the infamous 2023 CitrixBleed vulnerability. Organizations are urged to immediately patch affected systems and terminate all active sessions.
**This is now important and URGENT. Your Citrix NetScaler ADC or Gateway, exposed on the internet, they are actively attacked and exploited. Also, there seems to be some indisclosed severity in the three latest critical flaws and possibility of a repeat of the CitrixBleed incident from 2023. Immediately update to the latest patched versions (14.1-47.46, 13.1-59.19, or 13.1-37.236-FIPS). After patching, you must also terminate all active ICA and PCoIP sessions to prevent attackers from using stolen session tokens. If you have end-of-life devices, shut them down NOW - they will be hacked.**
#cybersecurity #infosec #attack #activeattack
https://beyondmachines.net/event_details/citrix-releases-emergency-patches-for-actively-exploited-vulnerability-in-netscaler-products-m-f-5-f-y/gD2P6Ple2L
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC – Source:thehackernews.com https://ciso2ciso.com/citrix-releases-emergency-patches-for-actively-exploited-cve-2025-6543-in-netscaler-adc-sourcethehackernews-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #TheHackerNews #Citrix
##Citrix warns of NetScaler vulnerability exploited in DoS attacks
Citrix is warning that a vulnerability in NetScaler appliances tracked as CVE-2025-6543 is being actively exploited in the wild, causing devices to...
🔗️ [Bleepingcomputer] https://link.is.it/c9w2Q9
##Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC https://thehackernews.com/2025/06/citrix-releases-emergency-patches-for.html
##🚨Security Advisory: Citrix NetScaler ADC / Gateway – CVE‑2025‑6543
https://darkwebinformer.com/security-advisory-citrix-netscaler-adc-gateway-cve-2025-6543/
##New:
Citrix: NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788
More:
The Hacker News: Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC https://thehackernews.com/2025/06/citrix-releases-emergency-patches-for.html @thehackernews #cybersecurity #Infosec
##updated 2025-06-26T21:31:20
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:20
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:13
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:13
6 posts
🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC
• CVSS: 10
• ZoomEye Dork: app="Cisco ISE"
• Results: 1,937
• Advisory:
github.com/advisories/GHSA-rc4f-42xm-hvjwgithub.com/advisories/GHSA-w8p2-wjjr-hr24
• PoC: github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
• ZoomEye Search: zoomeye.ai/searchResult?q=YXBwPSJDaXNjbyBJU0Ui
—————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##CVE-2025-20281 and CVE-2025-20282 Vulnerabilities: Critical RCE Flaws in Cisco ISE and ISE-PIC Enable Root Access – Source: socprime.com https://ciso2ciso.com/cve-2025-20281-and-cve-2025-20282-vulnerabilities-critical-rce-flaws-in-cisco-ise-and-ise-pic-enable-root-access-source-socprime-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #CVE-2025-20281 #CVE-2025-20282 #Latestthreats #Vulnerability #socprimecom #socprime #Blog #CVE #rce
##🚨Critical Cisco ISE Vulnerabilities, CVE-2025-20281 & CVE-2025-20282
Two unauthenticated RCE flaws have been disclosed in Cisco ISE and ISE-PIC, allowing remote attackers to execute commands as root without credentials.
CVE-2025-20281
• Affects: ISE 3.3 & 3.4
• Flaw: Improper input validation in external API
• CVSS: 9.8
CVE-2025-20282
• Affects: ISE 3.4
• Flaw: Internal API permits privileged file uploads
• CVSS: 10.0 (Critical)
Full advisory:
https://www.cisco.com/c/en/us/support/docs/field-notices/704/fn70475.html
CVE-2025-20281:
https://www.cvedetails.com/cve/CVE-2025-20281/
CVE-2025-20282:
https://www.cvedetails.com/cve/CVE-2025-20282/
Cisco posted these yesterday.
- Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities - CVE-2025-20281 and
CVE-2025-20282 (critical) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- Cisco Identity Services Engine Authorization Bypass Vulnerability - CVE-2025-20264 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-mVfKVQAU @TalosSecurity #cybersecurity #infosec #Cisco
##Exploitable without authentication, the two flaws are tracked as CVE-2025-20281 and CVE-2025-20282 and have the maximum severity score of 10/10. Both impact specific APIs within the affected products. https://www.securityweek.com/critical-cisco-ise-vulnerabilities-allow-remote-code-execution/
##Cisco reports perfect 10 critical remote code execution flaws in Identity Services Engine (ISE)
Cisco has issued an emergency advisory for two maximum-severity vulnerabilities (CVE-2025-20281 and CVE-2025-20282) in its Identity Services Engine (ISE) platforms that allow unauthenticated remote attackers to execute arbitrary code with root privileges through API input validation flaws and malicious file uploads. Organizations are urged to immediately apply the available patches as no workarounds exist to mitigate the flaws.
**This one is very important. If you are using Cisco Identity Services Engine (ISE), drop everything and start planning a patch ASAP. ISE usually controls network access to a lot of the infrastructure, so you don't want it to be hacked. And hackers will quickly start abusing these flaws.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisco-reports-perfect-10-critical-remote-code-execution-flaws-in-identity-services-engine-ise-m-m-f-c-7/gD2P6Ple2L
updated 2025-06-26T21:31:13
1 posts
updated 2025-06-26T21:31:13
1 posts
updated 2025-06-26T21:31:13
1 posts
Nvidia updates, from yesterday.
- Security Bulletin: NVIDIA AIStore on Kubernetes - June 2025, affecting CVE-2025-23260 https://nvidia.custhelp.com/app/answers/detail/a_id/5660
This affects CVE-2025-23264 and CVE-2025-23265: NVIDIA Megatron LM - June 2025 https://nvidia.custhelp.com/app/answers/detail/a_id/5663 #cybersecurity #Infoec #Nvidia
##updated 2025-06-26T21:31:13
1 posts
Multiple critical flaws reported in MICROSENS NMP Web+ Network Management Platform
MICROSENS has patched three critical vulnerabilities in its NMP Web+ network management platform, including authentication bypass through hard-coded JWT constants (CVE-2025-49151) and path traversal enabling arbitrary code execution (CVE-2025-49153). The company urges immediate updates to version 3.3.0 for all installations running version 3.2.5 or earlier.
**If you use MICROSENS NMP Web+ network management platform, make sure it's isolated from the internet and accessible only fron trusted networks. Then plan a quick update to version 3.3.0 to patch, because these flaws are fairly trivial to abuse.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-critical-flaws-reported-in-microsens-nmp-web-network-management-platform-2-m-v-t-v/gD2P6Ple2L
updated 2025-06-26T21:31:12
1 posts
Cisco posted these yesterday.
- Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities - CVE-2025-20281 and
CVE-2025-20282 (critical) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- Cisco Identity Services Engine Authorization Bypass Vulnerability - CVE-2025-20264 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-mVfKVQAU @TalosSecurity #cybersecurity #infosec #Cisco
##updated 2025-06-26T21:31:10
1 posts
Nvidia updates, from yesterday.
- Security Bulletin: NVIDIA AIStore on Kubernetes - June 2025, affecting CVE-2025-23260 https://nvidia.custhelp.com/app/answers/detail/a_id/5660
This affects CVE-2025-23264 and CVE-2025-23265: NVIDIA Megatron LM - June 2025 https://nvidia.custhelp.com/app/answers/detail/a_id/5663 #cybersecurity #Infoec #Nvidia
##updated 2025-06-26T21:31:09
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:09
2 posts
Oh hey, now if the baddies get your box, you can privesc to get it back.
https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1002/
##Incorrect Permission Assignment for Critical Resource in the TeamViewer Client (Full and Host) of TeamViewer Remote and Tensor prior Version 15.67 on Windows allows a local unprivileged user to trigger arbitrary file deletion with SYSTEM privileges via leveraging the MSI rollback mechanism. The vulnerability only applies to the Remote Management features: Backup, Monitoring, and Patch Management.
New TeamViewer Vulnerability Puts Windows Systems at Risk of Privilege Escalation https://thecyberexpress.com/cve-2025-36537-teamviewer-remote-management/ #TeamViewervulnerability #TheCyberExpressNews #TeamViewersecurity #TheCyberExpress #CVE-2025-36537 #FirewallDaily #CyberNews #CWE-732
##updated 2025-06-26T21:31:08
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:08
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T21:31:08
1 posts
updated 2025-06-26T21:31:08
1 posts
sigh
sev:CRIT 9.3 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
A hardcoded credential vulnerability exists in the Blue Angel Software Suite deployed on embedded Linux systems. The application contains multiple known default and hardcoded user accounts that are not disclosed in public documentation. These accounts allow unauthenticated or low-privilege attackers to gain administrative access to the device’s web interface.
And those creds are:
##
blueangel:blueangelroot:abnareum10root:Admin@tbroadroot:superuseruser:userguest:guest
updated 2025-06-26T20:35:07.773000
6 posts
1 repos
https://github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC
• CVSS: 10
• ZoomEye Dork: app="Cisco ISE"
• Results: 1,937
• Advisory:
github.com/advisories/GHSA-rc4f-42xm-hvjwgithub.com/advisories/GHSA-w8p2-wjjr-hr24
• PoC: github.com/abrewer251/CVE-2025-20281-2-Citrix-ISE-RCE
• ZoomEye Search: zoomeye.ai/searchResult?q=YXBwPSJDaXNjbyBJU0Ui
—————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership. 💙
##CVE-2025-20281 and CVE-2025-20282 Vulnerabilities: Critical RCE Flaws in Cisco ISE and ISE-PIC Enable Root Access – Source: socprime.com https://ciso2ciso.com/cve-2025-20281-and-cve-2025-20282-vulnerabilities-critical-rce-flaws-in-cisco-ise-and-ise-pic-enable-root-access-source-socprime-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #CVE-2025-20281 #CVE-2025-20282 #Latestthreats #Vulnerability #socprimecom #socprime #Blog #CVE #rce
##🚨Critical Cisco ISE Vulnerabilities, CVE-2025-20281 & CVE-2025-20282
Two unauthenticated RCE flaws have been disclosed in Cisco ISE and ISE-PIC, allowing remote attackers to execute commands as root without credentials.
CVE-2025-20281
• Affects: ISE 3.3 & 3.4
• Flaw: Improper input validation in external API
• CVSS: 9.8
CVE-2025-20282
• Affects: ISE 3.4
• Flaw: Internal API permits privileged file uploads
• CVSS: 10.0 (Critical)
Full advisory:
https://www.cisco.com/c/en/us/support/docs/field-notices/704/fn70475.html
CVE-2025-20281:
https://www.cvedetails.com/cve/CVE-2025-20281/
CVE-2025-20282:
https://www.cvedetails.com/cve/CVE-2025-20282/
Cisco posted these yesterday.
- Cisco Identity Services Engine Unauthenticated Remote Code Execution Vulnerabilities - CVE-2025-20281 and
CVE-2025-20282 (critical) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-unauth-rce-ZAd2GnJ6
- Cisco Identity Services Engine Authorization Bypass Vulnerability - CVE-2025-20264 https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-auth-bypass-mVfKVQAU @TalosSecurity #cybersecurity #infosec #Cisco
##Exploitable without authentication, the two flaws are tracked as CVE-2025-20281 and CVE-2025-20282 and have the maximum severity score of 10/10. Both impact specific APIs within the affected products. https://www.securityweek.com/critical-cisco-ise-vulnerabilities-allow-remote-code-execution/
##Cisco reports perfect 10 critical remote code execution flaws in Identity Services Engine (ISE)
Cisco has issued an emergency advisory for two maximum-severity vulnerabilities (CVE-2025-20281 and CVE-2025-20282) in its Identity Services Engine (ISE) platforms that allow unauthenticated remote attackers to execute arbitrary code with root privileges through API input validation flaws and malicious file uploads. Organizations are urged to immediately apply the available patches as no workarounds exist to mitigate the flaws.
**This one is very important. If you are using Cisco Identity Services Engine (ISE), drop everything and start planning a patch ASAP. ISE usually controls network access to a lot of the infrastructure, so you don't want it to be hacked. And hackers will quickly start abusing these flaws.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisco-reports-perfect-10-critical-remote-code-execution-flaws-in-identity-services-engine-ise-m-m-f-c-7/gD2P6Ple2L
updated 2025-06-26T18:58:14.280000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:58:14.280000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:58:14.280000
1 posts
Wait, we're still doing port knocking? I thought that was a lost art that got snuffed out by the "obscurity does not provide security" nerds.
https://github.com/mbuesch/letmein/security/advisories/GHSA-jpv7-p47h-f43j
##Letmein is an authenticating port knocker. Prior to version 10.2.1, The connection limiter is implemented incorrectly. It allows an arbitrary amount of simultaneously incoming connections (TCP, UDP and Unix socket) for the services letmeind and letmeinfwd. Therefore, the command line option num-connections is not effective and does not limit the number of simultaneously incoming connections. This issue has been patched in version 10.2.1.
updated 2025-06-26T18:58:14.280000
1 posts
updated 2025-06-26T18:58:14.280000
1 posts
LMAO. It's an older vuln and was added to CNVD in 2020 but just got a CVE last week. 🥳
sev:CRIT 10.0 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
An OS command injection vulnerability exists in the Chinese versions of Sangfor Endpoint Detection and Response (EDR) management platform versions 3.2.16, 3.2.17, and 3.2.19. The vulnerability allows unauthenticated attackers to construct and send malicious HTTP requests to the EDR Manager interface, leading to arbitrary command execution with elevated privileges. This flaw only affects the Chinese-language EDR builds.
https://www.cnvd.org.cn/flaw/show/CNVD-2020-46552
https://nvd.nist.gov/vuln/detail/CVE-2025-34041
And FWIW, ShadowServer shows EITW in CN.
##updated 2025-06-26T18:58:14.280000
1 posts
Nvidia updates, from yesterday.
- Security Bulletin: NVIDIA AIStore on Kubernetes - June 2025, affecting CVE-2025-23260 https://nvidia.custhelp.com/app/answers/detail/a_id/5660
This affects CVE-2025-23264 and CVE-2025-23265: NVIDIA Megatron LM - June 2025 https://nvidia.custhelp.com/app/answers/detail/a_id/5663 #cybersecurity #Infoec #Nvidia
##updated 2025-06-26T18:57:43.670000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:57:43.670000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:57:43.670000
1 posts
Oof.
https://www.ibm.com/support/pages/node/7237967
sev:CRIT 9.0 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
##IBM WebSphere Application Server 8.5 and 9.0 could allow a remote attacker to execute arbitrary code on the system with a specially crafted sequence of serialized objects.
updated 2025-06-26T18:57:43.670000
1 posts
Multiple critical flaws reported in MICROSENS NMP Web+ Network Management Platform
MICROSENS has patched three critical vulnerabilities in its NMP Web+ network management platform, including authentication bypass through hard-coded JWT constants (CVE-2025-49151) and path traversal enabling arbitrary code execution (CVE-2025-49153). The company urges immediate updates to version 3.3.0 for all installations running version 3.2.5 or earlier.
**If you use MICROSENS NMP Web+ network management platform, make sure it's isolated from the internet and accessible only fron trusted networks. Then plan a quick update to version 3.3.0 to patch, because these flaws are fairly trivial to abuse.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-critical-flaws-reported-in-microsens-nmp-web-network-management-platform-2-m-v-t-v/gD2P6Ple2L
updated 2025-06-26T18:31:35
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:31:35
7 posts
updated 2025-06-26T18:31:34
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:31:34
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:31:34
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-26T18:31:26
1 posts
Insecure defaults can lead to surprises. When creating FIFO sockets with systemd, be sure to note that SocketMode defaults to 0666 - that is world readable and writable. That is: any local user can communicate with the FIFO. If your FIFO is used to perform privileged operations you must ensure that either the FIFO file itself is located in secured location or set SocketMode to stricter value.
I spotted one such insecure use in cloud-init: the hotplug FIFO was world writable. This is CVE-2024-11584 and fixed in cloud-init 25.1.3.
The commit fixing this is in https://github.com/canonical/cloud-init/pull/6265
##updated 2025-06-26T18:31:25
1 posts
Wat
sev:HIGH 8.8 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
##When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.
updated 2025-06-25T20:14:57.620000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-25T20:09:56.243000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-25T20:09:39.790000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-25T20:09:28.010000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-25T19:03:33.817000
8 posts
3 repos
https://github.com/skimask1690/CVE-2025-6218-POC
A critical vulnerability (CVE-2025-6218) in WinRAR allows remote code execution via directory traversal on Windows, risking sensitive data. ⚠️
RARLAB has released WinRAR 7.12 Final to fix this issue. Windows users should update immediately for protection. 🔒
#CyberSecurity #Privacy #Security #OpenSource #UserSafety #software #SoftwareUpdate #WinRAR #RAR #ZIP #DataProtection #Microsoft #Windows
##Patchez WinRAR : une faille permet l’exécution de malware via des archives piégées https://www.it-connect.fr/winrar-patch-cve-2025-6218/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##WinRAR patches bug letting malware launch from extracted archives
WinRAR has addressed a directory traversal vulnerability tracked as CVE-2025-6218 that, under certain circumstances, allows malware to be executed...
🔗️ [Bleepingcomputer] https://link.is.it/ZJNdY3
##WinRAR exploit enables attackers to run malicious code on your PC — critical vulnerability patched in latest beta update
The CVE-2025-6218 bug allows attackers to manipulate archive paths, potentially writing to protected system folders
#hardware
https://www.tomshardware.com/software/winrar-exploit-enables-attackers-to-run-malicious-code-on-your-pc-critical-vulnerability-patched-in-latest-beta-update
A recently patched directory traversal vulnerability (CVE-2025-6218) in WinRAR could be leveraged by remote attackers to execute arbitrary code on affected installations.
##High-risk WinRAR RCE vulnerability patched, update quickly! (CVE-2025-6218) https://www.helpnetsecurity.com/2025/06/24/high-risk-winrar-rce-flaw-patched-update-quickly-cve-2025-6218/ #vulnerability #TrendMicro #Don'tmiss #Hotstuff #Windows #WinRAR #News
##Directory traversal flaw in WinRAR enables remote code execution
RARLAB has patched a path traversal vulnerability (CVE-2025-6218) in WinRAR that allows attackers to execute malicious code by manipulating file extraction paths through specially crafted archive files that redirect extraction to unintended directories.
**If you use WinRAR on Windows, be very cautious of unexpected RAR attachments and never download files from pirated or untrusted sources. Check for the next stable release of WinRAR and update when it's released.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/directory-traversal-flaw-in-winrar-enables-remote-code-execution-p-p-6-n-4/gD2P6Ple2L
updated 2025-06-24T21:30:36
1 posts
Multiple vulnerabilities reported in ControlID iDSecure vehicle access control systems
ControlID has patched three critical vulnerabilities in its iDSecure On-Premises access control software, including a SQL injection flaw (CVE-2025-49853) and authentication bypass (CVE-2025-49851) that could allow attackers to gain unauthorized access to physical facilities and manipulate vehicle access systems.
**If you use ControlID iDSecure On-Premises access control software, check if it's accessible from the internet. If it is, make sure it's isolated from the internet and accessible only from trusted networks as much as possible Then plan a quick update to version 4.7.50.0. This system controls physical access to your facilities, so breaching it may get criminals access to your premises.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/multiple-vulnerabilities-reported-in-controlid-idsecure-vehicle-access-control-systems-3-6-m-4-t/gD2P6Ple2L
updated 2025-06-24T21:30:36
1 posts
Security vulnerabilities reported in Kaleris Navis N4 terminal Operating System
Kaleris has patched critical vulnerabilities in its Navis N4 Terminal Operating System used for port operations, including a critical deserialization flaw (CVE-2025-2566) allowing unauthenticated remote code execution and a credential exposure issue (CVE-2025-5087) transmitting sensitive data in cleartext. The company has released patches across multiple version branches and recommends isolating systems from the internet or implementing VPN access for organizations unable to immediately update.
**If you use Navis N4 Terminal Operating System, first check if it's isolated from the internet or requires internet connectivity. Then, prioritize updating to the latest patched version for your branch. If you can't update right away, isolate your N4 systems from the internet or disable the Ultra Light Client component on any internet-facing systems.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/security-vulnerabilities-reported-in-kaleris-navis-n4-terminal-operating-system-y-r-m-i-p/gD2P6Ple2L
updated 2025-06-24T21:30:35
1 posts
Security vulnerabilities reported in Kaleris Navis N4 terminal Operating System
Kaleris has patched critical vulnerabilities in its Navis N4 Terminal Operating System used for port operations, including a critical deserialization flaw (CVE-2025-2566) allowing unauthenticated remote code execution and a credential exposure issue (CVE-2025-5087) transmitting sensitive data in cleartext. The company has released patches across multiple version branches and recommends isolating systems from the internet or implementing VPN access for organizations unable to immediately update.
**If you use Navis N4 Terminal Operating System, first check if it's isolated from the internet or requires internet connectivity. Then, prioritize updating to the latest patched version for your branch. If you can't update right away, isolate your N4 systems from the internet or disable the Ultra Light Client component on any internet-facing systems.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/security-vulnerabilities-reported-in-kaleris-navis-n4-terminal-operating-system-y-r-m-i-p/gD2P6Ple2L
updated 2025-06-24T21:30:28
1 posts
Get your Flippers out.
##An issue in Realtek RTL8762EKF-EVB RTL8762E SDK v1.4.0 allows attackers to cause a Denial of Service (DoS) via sending a crafted before a pairing public key is received during a Bluetooth connection attempt.
updated 2025-06-24T19:00:21
2 posts
Woohoo! Another perfect 10 from last week. And this could hit hard. 🥳
https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
Critical Gogs flaw enables complete code repository takeover
Security researchers have disclosed a critical vulnerability (CVE-2024-56731) in the Gogs self-hosted Git service that allows authenticated attackers to execute arbitrary commands and gain administrative control through a symbolic link bypass enabling unprivileged users to delete critical system files and potentially conduct supply chain attacks.
**If you use Gogs self-hosted Git service, plan a quick upgrade to version 0.13.3. Your Gogs is vulnerable to a flaw that allows complete system takeover. If posible, isolate Gogs from the internet and if you can't upgrade right away, disable user registration in your Gogs configuration to prevent attackers from registering and exploiting this flaw. Then plan a patch cycle.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-gogs-flaw-enables-complete-code-repository-takeover-4-l-z-k-w/gD2P6Ple2L
updated 2025-06-23T22:41:52
1 posts
PBKDF2 JS Lib: Improper Input Validation Vulnerability
##updated 2025-06-23T22:41:42
2 posts
updated 2025-06-23T21:31:56
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T21:31:56
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T21:31:56
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T20:16:40.143000
1 posts
Mattermostの任意コード実行の脆弱性、CVSS v3のスコアが9.9
NVD - CVE-2025-4981 : 👀
---
https://nvd.nist.gov/vuln/detail/CVE-2025-4981
updated 2025-06-23T20:16:21.633000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T20:16:21.633000
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T18:31:23
1 posts
🚨CVE-2025-50054: Buffer overflow in OpenVPN ovpn-dco-win version 1.3.0 and earlier and version 2.5.8 and earlier allows a local user process to send a too large control message buffer to the kernel driver resulting in a system crash
ZoomEye Link: https://www.zoomeye.ai/searchResult?q=YXBwPSJPcGVuVlBOIg%3D%3D
Results: 2,020,603
ZoomEye Dork: app="OpenVPN"
Advisory: https://github.com/advisories/GHSA-c5v3-f4mm-7xmw
CVSS: 5.5
—————————
Follow @zoomeye_team's official Twitter/X account and send the message “Dark Web Informer” via DM to receive an extra 15-day membership.
I am trying to do more for the DWI community, so this is just the start! 💙
##updated 2025-06-23T18:30:33
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-23T15:31:43
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-22T18:30:39
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-22T18:30:31
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:38
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:37
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-21T00:30:37
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T22:21:17
2 posts
5 repos
https://github.com/Zen-kun04/CVE-2025-49132
https://github.com/qiaojojo/CVE-2025-49132_poc
https://github.com/melonlonmeo/CVE-2025-49132
FYI: There is a ton of scanning for this one for some reason.
/locales/locale.json?locale=../../../pterodactyl&namespace=config/database
/locales/locale.json?locale=../../config/&namespace=database
FYI: There is a ton of scanning for this one for some reason.
/locales/locale.json?locale=../../../pterodactyl&namespace=config/database
/locales/locale.json?locale=../../config/&namespace=database
updated 2025-06-20T21:32:14
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T21:32:14
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T21:32:13
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-20T21:32:13
2 posts
Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##Everyone likes vulnerable network devices, right? Cool. Have fun. And as always, poke around the linked repos for more goodies.
Linksys:
https://www.exploit-db.com/exploits/31683
https://nvd.nist.gov/vuln/detail/CVE-2025-34037
https://github.com/CH13hh/tmp_store_cc/blob/main/E8450/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6751
https://github.com/feiwuxingxie/cve/blob/main/linksys/vul01/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6752
D-Link:
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_74/74.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6374
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_73/73.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6373
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6372
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_71/71.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6371
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_70/70.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6370
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_69/69.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6369
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_68/68.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6368
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6367
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://github.com/Synmac05/CVE-advisories/blob/main/CVE-2025-45931.md
https://nvd.nist.gov/vuln/detail/CVE-2025-45931
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_77/77.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6616
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_76/76.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6615
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_75/75.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6614
https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_78/78.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6617
https://nvd.nist.gov/vuln/detail/CVE-2025-34048
https://www.kdev.site/2025/04/02/d-link-823_pro-unauthorized-telnet-access/
https://nvd.nist.gov/vuln/detail/CVE-2025-45729
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_1_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6896
https://vuldb.com/?submit.603693
https://nvd.nist.gov/vuln/detail/CVE-2025-6882
https://vuldb.com/?submit.603692
https://nvd.nist.gov/vuln/detail/CVE-2025-6881
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_4_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6899
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_3_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6898
https://github.com/2664521593/mycve/blob/main/D-Link_DI/CJ_IN_DLink_2_en.pdf
https://nvd.nist.gov/vuln/detail/CVE-2025-6897
Netgear:
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6511
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6510
https://github.com/xiaobor123/vul-finds/tree/main/vul-find-wnce3001-netgear
https://nvd.nist.gov/vuln/detail/CVE-2025-6565
TOTOLINK:
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_36/36.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6487
https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_35/35.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6486
https://github.com/d2pq/cve/blob/main/616/22.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6402
https://github.com/d2pq/cve/blob/main/616/20.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6400
https://github.com/d2pq/cve/blob/main/616/19.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6399
https://github.com/awindog/cve/blob/main/688/16.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6393
https://github.com/c0nyy/IoT_vuln/blob/main/TOTOLINK%20T6%20Vuln.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6916
https://github.com/d2pq/cve/blob/main/616/23.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6568
https://github.com/d2pq/cve/blob/main/616/24.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6627
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_47/47.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6621
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_46/46.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6620
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_45/45.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6619
https://github.com/wudipjq/my_vuln/blob/main/totolink4/vuln_44/44.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6618
https://github.com/awindog/cve/blob/main/688/29.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6825
https://github.com/awindog/cve/blob/main/688/28.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6824
Tenda:
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
https://nvd.nist.gov/vuln/detail/CVE-2025-6887
https://nvd.nist.gov/vuln/detail/CVE-2025-6886
Edimax:
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34029
https://www.exploit-db.com/exploits/48377
https://nvd.nist.gov/vuln/detail/CVE-2025-34024
UTT:
https://github.com/d2pq/cve/blob/main/616/1.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
https://github.com/d2pq/cve/blob/main/616/3.md
https://nvd.nist.gov/vuln/detail/CVE-2025-6734
Advantech:
https://jro.sg/CVEs/CVE-2025-48469/
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061
https://nvd.nist.gov/vuln/detail/CVE-2025-6732
OptiLink:
https://www.exploit-db.com/exploits/49955
https://nvd.nist.gov/vuln/detail/CVE-2025-34049
Sapidio:
https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6560
https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html
https://nvd.nist.gov/vuln/detail/CVE-2025-6559
WIFISKY:
https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution
https://nvd.nist.gov/vuln/detail/CVE-2025-34044
Vacron NVR:
https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/
https://nvd.nist.gov/vuln/detail/CVE-2025-34043
Beward IP Camera:
https://cxsecurity.com/issue/WLB-2019020042
https://nvd.nist.gov/vuln/detail/CVE-2025-34042
Selea Targa IP Cameras:
https://cxsecurity.com/issue/WLB-2021010165
https://nvd.nist.gov/vuln/detail/CVE-2025-34022
https://cxsecurity.com/issue/WLB-2021010170
##updated 2025-06-18T14:15:12
3 posts
Critical remote authentication bypass flaw reported in Teleport access management platform
Teleport has disclosed a critical authentication bypass vulnerability (CVE-2025-49825) that allows remote attackers to completely bypass authentication controls and gain unauthorized access to servers, databases, and cloud applications managed through the platform. The company has released patches across all supported major releases and urges immediate manual upgrades for self-hosted deployments. Teleport is withholding technical details under embargo until June 30, 2025 to achieve higher update coverage.
**If you use self-hosted Teleport for infrastructure access, this is urgent and important. Immediately update to the latest patched version for your branch (17.5.2, 16.5.12, 15.5.3, 14.4.1, 13.4.27, or 12.4.35). Make sure to update both your Teleport proxy servers AND all agents - the vulnerability isn't fully patched until both components are upgraded.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-remote-authentication-bypass-flaw-reported-in-teleport-access-management-platform-u-t-q-o-y/gD2P6Ple2L
updated 2025-06-17T20:50:23.507000
2 posts
Citrix on this one:
"At this time, there have been no reports or indications that the vulnerabilities described in CTX693420 (CVE-2025-5349 and CVE-2025-5777) are being actively exploited in the wild. However, due to the critical severity of these issues (CVSS scores of 8.7 and 9.3), We strongly recommends that affected customers apply the updated patches immediately to mitigate any potential risks."
##Critical vulnerabilities discovered in Citrix NetScaler ADC and Gateway products
Citrix has patched two critical vulnerabilities in NetScaler ADC and Gateway products, including an unauthenticated memory overread flaw (CVE-2025-5777) that could expose sensitive data and an access control bypass on the management interface (CVE-2025-5349). The company strongly urges updates for customer-managed instances.
**If you have self-hosted Citrix NetScaler ADC or Gateway, check if your version is still supported and apply the security patches. This is especially important if your Citrix functions as a gateway/VPN server. Take note that versions 12.1 and 13.0 are end-of-life with no fixes available. After patching, restart all active user sessions to clear any potential compromises from these critical vulnerabilities.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-discovered-in-citrix-netscaler-adc-and-gateway-products-4-l-a-4-n/gD2P6Ple2L
updated 2025-06-17T15:31:16
16 posts
1 repos
https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
If you see this GitHub PoC for CVE-2025-5777 doing the rounds:
https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
It’s not for CVE-2025-5777. It’s AI generated. The links in the README still have ChatGPT UTM sources.
The PoC itself is for a vuln addressed in 2023 - ChatGPT has hallucinated (made up) the cause of the vuln using an old BishopFox write up of the other vuln.
##Citrix blog on CVE-2025-5777 and some other ones https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/
##If you see this GitHub PoC for CVE-2025-5777 doing the rounds:
https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
It’s not for CVE-2025-5777. It’s AI generated. The links in the README still have ChatGPT UTM sources.
The PoC itself is for a vuln addressed in 2023 - ChatGPT has hallucinated (made up) the cause of the vuln using an old BishopFox write up of the other vuln.
##Citrix blog on CVE-2025-5777 and some other ones https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/
##CVE ID: CVE-2025-6543
Vendor: Citrix
Product: NetScaler ADC and Gateway
Date Added: 2025-06-30
Notes: https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 ; https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/ ; https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-6543
CitrixBleed 2 might be actively exploited (CVE-2025-5777) https://www.helpnetsecurity.com/2025/06/30/citrixbleed-2-might-be-actively-exploited-cve-2025-5777/ #vulnerability #enterprise #ReliaQuest #Don'tmiss #NetScaler #Hotstuff #Censys #Citrix #News
##CVE-2025-5777, CVE-2025-6543: Frequently Asked Questions About CitrixBleed 2 and Citrix NetScaler Exploitation – Source: securityboulevard.com https://ciso2ciso.com/cve-2025-5777-cve-2025-6543-frequently-asked-questions-about-citrixbleed-2-and-citrix-netscaler-exploitation-source-securityboulevard-com/ #rssfeedpostgeneratorecho #SecurityBloggersNetwork #CyberSecurityNews #SecurityBoulevard
##I love how statements like:
"Currently, there is no evidence to suggest exploitation of CVE-2025-5777."
... is NOT comforting at all. It pretty much sounds just like... "we found NO vulnerabilities in our LLM-generated application".
... and how on earth would Netscaler see targeted exploitation? Exactly... Netscaler wouldn't, you might however with appropriate monitoring.
##Critical Citrix Netscaler "Citrix Bleed 2" flaw actively exploited
A critical vulnerability in Citrix NetScaler devices, dubbed "Citrix Bleed 2" (CVE-2025-5777), is now being actively exploited by threat actors according to ReliaQuest, raising concerns of a repeat of the devastating 2023 "Citrix Bleed" campaign that affected major companies like Boeing and Comcast's 36 million customers.
**This is now important and URGENT. Your Citrix NetScaler ADC or Gateway, exposed on the internet, they are actively attacked and exploited. After patching, you must terminate all active ICA and PCoIP sessions since they may already be compromised by attackers.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-citrix-netscaler-citrix-bleed-2-flaw-actively-exploited-4-y-j-i-q/gD2P6Ple2L
Citrix Bleed 2 flaw now believed to be exploited in attacks
[...] A critical NetScaler ADC and Gateway vulnerability dubbed "Citrix Bleed 2" (CVE-2025-5777) is now likely exploited in attacks, according to cybersecurity firm ReliaQuest, seeing an increase in suspicious sessions on Citrix devices.
##Citrix Bleed 2 flaw now believed to be exploited in attacks
A critical NetScaler ADC and Gateway vulnerability dubbed "Citrix Bleed 2" (CVE-2025-5777) is now likely exploited in attacks, according to...
🔗️ [Bleepingcomputer] https://link.is.it/uEldK5
##Citrix on this one:
"At this time, there have been no reports or indications that the vulnerabilities described in CTX693420 (CVE-2025-5349 and CVE-2025-5777) are being actively exploited in the wild. However, due to the critical severity of these issues (CVSS scores of 8.7 and 9.3), We strongly recommends that affected customers apply the updated patches immediately to mitigate any potential risks."
##An update on CVE-2025-5777, explaining why orgs should identify systems and patch.
https://doublepulsar.com/citrixbleed-2-electric-boogaloo-cve-2025-5777-c7f5e349d206
##Critical vulnerabilities discovered in Citrix NetScaler ADC and Gateway products
Citrix has patched two critical vulnerabilities in NetScaler ADC and Gateway products, including an unauthenticated memory overread flaw (CVE-2025-5777) that could expose sensitive data and an access control bypass on the management interface (CVE-2025-5349). The company strongly urges updates for customer-managed instances.
**If you have self-hosted Citrix NetScaler ADC or Gateway, check if your version is still supported and apply the security patches. This is especially important if your Citrix functions as a gateway/VPN server. Take note that versions 12.1 and 13.0 are end-of-life with no fixes available. After patching, restart all active user sessions to clear any potential compromises from these critical vulnerabilities.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-vulnerabilities-discovered-in-citrix-netscaler-adc-and-gateway-products-4-l-a-4-n/gD2P6Ple2L
Critical Citrix NetScaler bug fixed, upgrade ASAP! (CVE-2025-5777) https://www.helpnetsecurity.com/2025/06/23/critical-citrix-netscaler-bug-fixed-upgrade-asap-cve-2025-5777/ #securityupdate #vulnerability #enterprise #Don'tmiss #NetScaler #Hotstuff #Citrix #News
##I don't know who uses #Citrix Netscalers any longer, but if you do, you've got some work to do to ensure that they are secure. The post describes the work you have to do -- in addition to applying the appropriate patches -- to address recent vulnerabilities. #cybersecurity
https://www.deyda.net/index.php/en/2025/06/17/checklist-for-netscaler-citrix-adc-cve-2025-5777/
##updated 2025-06-10T21:31:31
1 posts
Critical build cache flaw exposes organizations to production code injection attacks
Security researchers at Nx have disclosed a critical vulnerability (CVE-2025-36852) nicknamed "CREEP" that exploits the "first-to-cache wins" principle in remote caching systems, allowing any developer with pull request access to inject malicious code into production environments through race conditions in shared build cache infrastructure. The vulnerability affects organizations using popular build tools with remote caching on platforms like Amazon S3 and Google Cloud Storage.
**If your CI/CD system uses remote caching (like S3 or Google Cloud Storage) review whether pull request builds can write to the same cache used by production builds. You may not want to do anything and be optimistic, but ideally consider disabling cache writes from untrusted pull request environments or implement isolated cache namespaces so PRs can only read from production cache but write to their own separate cache space.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-build-cache-flaw-exposes-organizations-to-production-code-injection-attacks-9-f-q-5-x/gD2P6Ple2L
updated 2025-06-09T19:06:12
1 posts
Malcolm v25.06.0 includes a some new and oft-requested features, bug fixes, and component version bumps.
NOTE: As this Malcolm release enables the OpenSearch Security Plugin as described below, even inter-container access to OpenSearch must now be authenticated when using Malcolm's embedded OpenSearch instance. To accomplish this, an internal-use-only account and password is used for connecting to OpenSearch by Malcolm's other components as needed. This credential (saved in .opensearch.primary.curlrc in the Malcolm installation directory) needs to be generated before Malcolm starts up the first time after upgrading. To do so, please run ./scripts/auth_setup and select (Re)generate internal passwords for local primary OpenSearch instance. This credential is only used internally for OpenSearch and cannot be used to remotely access Malcolm.
keycloak or keycloak_remote. With other authentication methods such as HTTP basic or LDAP, or when RBAC is disabled, all Malcolm users effectively have administrator privileges../config/keycloak.env.db.pl and also use them for Malcolm's creation of its own index templates (cisagov/Malcolm#692)intel.log with additional fields using corelight/ExtendIntel (part 1) (cisagov/Malcolm#502)intel.log to the user. Further work to do so will be continued in cisagov/Malcolm#695.sec_token_id field (cisagov/icsnpp-opcua-binary#101)kafka.zeek) to make it easier to override in Docker using a volume bind mount or in K8s using a configMap.Concurrent::Hash to Concurrent::Map for better performancerobots.txt file to avoid web crawlers/readme is trying to pull fonts from use.fontawesome.com (cisagov/Malcolm#694)config.ini setting maxFileSizeG from PCAP_ROTATE_MEGABYTESMalcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #rbac #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL #DHS #CISA #CISAgov
##updated 2025-06-05T20:12:23.777000
1 posts
Cisco posted this yesterday:
Cisco Identity Services Engine Arbitrary File Upload Vulnerability - CVE-2025-20130 (medium) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-P4M8vwXY @TalosSecurity #cybersecurity #infosec
##updated 2025-05-17T18:55:58
1 posts
Malcolm v25.06.0 includes a some new and oft-requested features, bug fixes, and component version bumps.
NOTE: As this Malcolm release enables the OpenSearch Security Plugin as described below, even inter-container access to OpenSearch must now be authenticated when using Malcolm's embedded OpenSearch instance. To accomplish this, an internal-use-only account and password is used for connecting to OpenSearch by Malcolm's other components as needed. This credential (saved in .opensearch.primary.curlrc in the Malcolm installation directory) needs to be generated before Malcolm starts up the first time after upgrading. To do so, please run ./scripts/auth_setup and select (Re)generate internal passwords for local primary OpenSearch instance. This credential is only used internally for OpenSearch and cannot be used to remotely access Malcolm.
keycloak or keycloak_remote. With other authentication methods such as HTTP basic or LDAP, or when RBAC is disabled, all Malcolm users effectively have administrator privileges../config/keycloak.env.db.pl and also use them for Malcolm's creation of its own index templates (cisagov/Malcolm#692)intel.log with additional fields using corelight/ExtendIntel (part 1) (cisagov/Malcolm#502)intel.log to the user. Further work to do so will be continued in cisagov/Malcolm#695.sec_token_id field (cisagov/icsnpp-opcua-binary#101)kafka.zeek) to make it easier to override in Docker using a volume bind mount or in K8s using a configMap.Concurrent::Hash to Concurrent::Map for better performancerobots.txt file to avoid web crawlers/readme is trying to pull fonts from use.fontawesome.com (cisagov/Malcolm#694)config.ini setting maxFileSizeG from PCAP_ROTATE_MEGABYTESMalcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #rbac #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL #DHS #CISA #CISAgov
##updated 2025-05-17T18:54:45
1 posts
Malcolm v25.06.0 includes a some new and oft-requested features, bug fixes, and component version bumps.
NOTE: As this Malcolm release enables the OpenSearch Security Plugin as described below, even inter-container access to OpenSearch must now be authenticated when using Malcolm's embedded OpenSearch instance. To accomplish this, an internal-use-only account and password is used for connecting to OpenSearch by Malcolm's other components as needed. This credential (saved in .opensearch.primary.curlrc in the Malcolm installation directory) needs to be generated before Malcolm starts up the first time after upgrading. To do so, please run ./scripts/auth_setup and select (Re)generate internal passwords for local primary OpenSearch instance. This credential is only used internally for OpenSearch and cannot be used to remotely access Malcolm.
keycloak or keycloak_remote. With other authentication methods such as HTTP basic or LDAP, or when RBAC is disabled, all Malcolm users effectively have administrator privileges../config/keycloak.env.db.pl and also use them for Malcolm's creation of its own index templates (cisagov/Malcolm#692)intel.log with additional fields using corelight/ExtendIntel (part 1) (cisagov/Malcolm#502)intel.log to the user. Further work to do so will be continued in cisagov/Malcolm#695.sec_token_id field (cisagov/icsnpp-opcua-binary#101)kafka.zeek) to make it easier to override in Docker using a volume bind mount or in K8s using a configMap.Concurrent::Hash to Concurrent::Map for better performancerobots.txt file to avoid web crawlers/readme is trying to pull fonts from use.fontawesome.com (cisagov/Malcolm#694)config.ini setting maxFileSizeG from PCAP_ROTATE_MEGABYTESMalcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #rbac #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL #DHS #CISA #CISAgov
##updated 2025-05-16T14:43:56.797000
1 posts
4 repos
https://github.com/INTELEON404/CVE-2025-0133
https://github.com/dodiorne/cve-2025-0133
https://github.com/wiseep/CVE-2025-0133
https://github.com/ynsmroztas/-CVE-2025-0133-GlobalProtect-XSS
updated 2025-05-16T09:30:42
1 posts
Vulnerability in Synology Active Backup for Microsoft 365 exposes credentials, enables unauthorized access to Teams chats
Security researchers discovered a vulnerability (CVE-2025-4679) in Synology's Active Backup for Microsoft 365 that exposed a master credential in HTTP redirects, allowing attackers to gain unauthorized access to sensitive Microsoft 365 data across all organizations using the popular backup solution with over 1.2 million installations.
**If you use Synology's Active Backup for Microsoft 365, be aware that a critical flaw exposed your Microsoft 365 data to potential unauthorized access until recently. Even though Synology says they've fixed it, check your Microsoft 365 audit logs for any suspicious access and ensure your Synology system is fully updated. If developing applications, check if any of your responses contains secrets that shouldn't be there.**
#cybersecurity #infosec #advisory #databreach
https://beyondmachines.net/event_details/vulnerability-in-synology-active-backup-for-microsoft-365-exposes-credentials-enables-unauthorized-access-to-teams-chats-k-0-f-g-g/gD2P6Ple2L
updated 2025-05-15T18:37:33.893000
1 posts
30 repos
https://github.com/RevoltSecurities/CVE-2023-20198
https://github.com/raystr-atearedteam/CVE-2023-20198-checker
https://github.com/kacem-expereo/CVE-2023-20198
https://github.com/alekos3/CVE_2023_20198_Detector
https://github.com/Pushkarup/CVE-2023-20198
https://github.com/reket99/Cisco_CVE-2023-20198
https://github.com/emomeni/Simple-Ansible-for-CVE-2023-20198
https://github.com/fox-it/cisco-ios-xe-implant-detection
https://github.com/JoyGhoshs/CVE-2023-20198
https://github.com/sanan2004/CVE-2023-20198
https://github.com/ZephrFish/CVE-2023-20198-Checker
https://github.com/mr-r3b00t/CVE-2023-20198-IOS-XE-Scanner
https://github.com/sohaibeb/CVE-2023-20198
https://github.com/netbell/CVE-2023-20198-Fix
https://github.com/Atea-Redteam/CVE-2023-20198
https://github.com/securityphoenix/cisco-CVE-2023-20198-tester
https://github.com/Vulnmachines/Cisco_CVE-2023-20198
https://github.com/ohlawd/CVE-2023-20198
https://github.com/Tounsi007/CVE-2023-20198
https://github.com/smokeintheshell/CVE-2023-20198
https://github.com/vulncheck-oss/cisco-ios-xe-implant-scanner
https://github.com/alekos3/CVE_2023_20198_Remediator
https://github.com/IceBreakerCode/CVE-2023-20198
https://github.com/iveresk/cve-2023-20198
https://github.com/G4sul1n/Cisco-IOS-XE-CVE-2023-20198
https://github.com/XiaomingX/cve-2023-20198-poc
https://github.com/W01fh4cker/CVE-2023-20198-RCE
Canadian Telco not patching year old RCE 🙄
“The Canadian Centre for Cyber Security and the FBI confirm that the Chinese state-sponsored 'Salt Typhoon' hacking group is also targeting Canadian telecommunication firms, breaching a telecom provider in February.
During the February 2025 incident, Salt Typhoon exploited the CVE-2023-20198 flaw, a critical Cisco IOS XE vulnerability allowing remote, unauthenticated attackers to create arbitrary accounts and gain admin-level privileges.”
##updated 2025-04-04T20:46:47.360000
1 posts
42 repos
https://github.com/skitkat/CVE-2021-40444-POC
https://github.com/MohamedAboHelal/CVE-2021-40444
https://github.com/kagura-maru/CVE-2021-40444-POC
https://github.com/mansk1es/Caboom
https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit
https://github.com/tiagob0b/CVE-2021-40444
https://github.com/DarkSprings/CVE-2021-40444
https://github.com/lisinan988/CVE-2021-40444-exp
https://github.com/metehangenel/MSHTML-CVE-2021-40444
https://github.com/RedLeavesChilde/CVE-2021-40444
https://github.com/Immersive-Labs-Sec/cve-2021-40444-analysis
https://github.com/lockedbyte/CVE-2021-40444
https://github.com/MRacumen/CVE-2021-40444
https://github.com/k8gege/CVE-2021-40444
https://github.com/W1kyri3/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx
https://github.com/H0j3n/CVE-2021-40444
https://github.com/fengjixuchui/CVE-2021-40444-docx-Generate
https://github.com/LazarusReborn/Docx-Exploit-2021
https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives
https://github.com/winstxnhdw/CVE-2022-30190
https://github.com/basim-ahmad/Follina-CVE-and-CVE-2021-40444
https://github.com/rfcxv/CVE-2021-40444-POC
https://github.com/hqdat809/CVE-2021-40444
https://github.com/ozergoker/CVE-2021-40444
https://github.com/InfoSecPolkCounty/CVE2021-40444-document-Scanner
https://github.com/k4k4/CVE-2021-40444-Sample
https://github.com/jamesrep/cve-2021-40444
https://github.com/Edubr2020/CVE-2021-40444--CABless
https://github.com/aydianosec/CVE2021-40444
https://github.com/Ascotbe/Kernelhub
https://github.com/Jeromeyoung/TIC4301_Project
https://github.com/Phuong39/CVE-2021-40444-CAB
https://github.com/KnoooW/CVE-2021-40444-docx-Generate
https://github.com/bambooqj/CVE-2021-40444_EXP_JS
https://github.com/Alexcot25051999/CVE-2021-40444
https://github.com/aslitsecurity/CVE-2021-40444_builders
https://github.com/Jeromeyoung/MSHTMHell
https://github.com/nvchungkma/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-
https://github.com/klezVirus/CVE-2021-40444
https://github.com/khoaduynu/CVE-2021-40444
updated 2025-03-27T16:45:46.410000
1 posts
22 repos
https://github.com/salt318/CVE-2025-1974
https://github.com/yoshino-s/CVE-2025-1974
https://github.com/hakaioffsec/IngressNightmare-PoC
https://github.com/m-q-t/ingressnightmare-detection-poc
https://github.com/rjhaikal/POC-IngressNightmare-CVE-2025-1974
https://github.com/gian2dchris/ingress-nightmare-poc
https://github.com/lufeirider/IngressNightmare-PoC
https://github.com/0xBingo/CVE-2025-1974
https://github.com/Rickerd12/exploit-cve-2025-1974
https://github.com/yanmarques/CVE-2025-1974
https://github.com/chhhd/CVE-2025-1974
https://github.com/Ar05un05kau05ndal/2025-1
https://github.com/abrewer251/CVE-2025-1974_IngressNightmare_PoC
https://github.com/zulloper/CVE-2025-1974
https://github.com/Rubby2001/CVE-2025-1974-go
https://github.com/sandumjacob/IngressNightmare-POCs
https://github.com/tuladhar/ingress-nightmare
https://github.com/dttuss/IngressNightmare-RCE-POC
https://github.com/B1ack4sh/Blackash-CVE-2025-1974
https://github.com/hi-unc1e/CVE-2025-1974-poc
https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps
ingress-nginx CVE-2025-1974 vulnerability allows unauthenticated remote access to its admission controller, enabling full Kubernetes cluster takeover via RCE
Mitigation requires urgent patching, network hardening, and audit log inspection
##updated 2025-03-20T10:15:33.743000
1 posts
Malcolm v25.06.0 includes a some new and oft-requested features, bug fixes, and component version bumps.
NOTE: As this Malcolm release enables the OpenSearch Security Plugin as described below, even inter-container access to OpenSearch must now be authenticated when using Malcolm's embedded OpenSearch instance. To accomplish this, an internal-use-only account and password is used for connecting to OpenSearch by Malcolm's other components as needed. This credential (saved in .opensearch.primary.curlrc in the Malcolm installation directory) needs to be generated before Malcolm starts up the first time after upgrading. To do so, please run ./scripts/auth_setup and select (Re)generate internal passwords for local primary OpenSearch instance. This credential is only used internally for OpenSearch and cannot be used to remotely access Malcolm.
keycloak or keycloak_remote. With other authentication methods such as HTTP basic or LDAP, or when RBAC is disabled, all Malcolm users effectively have administrator privileges../config/keycloak.env.db.pl and also use them for Malcolm's creation of its own index templates (cisagov/Malcolm#692)intel.log with additional fields using corelight/ExtendIntel (part 1) (cisagov/Malcolm#502)intel.log to the user. Further work to do so will be continued in cisagov/Malcolm#695.sec_token_id field (cisagov/icsnpp-opcua-binary#101)kafka.zeek) to make it easier to override in Docker using a volume bind mount or in K8s using a configMap.Concurrent::Hash to Concurrent::Map for better performancerobots.txt file to avoid web crawlers/readme is trying to pull fonts from use.fontawesome.com (cisagov/Malcolm#694)config.ini setting maxFileSizeG from PCAP_ROTATE_MEGABYTESMalcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #rbac #Zeek #Arkime #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL #DHS #CISA #CISAgov
##updated 2025-03-14T17:30:07
1 posts
This post analyzes CVE-2025-1767, a Kubernetes vulnerability where gitRepo volumes let pods clone any host-local Git repo if the attacker knows the path
##updated 2025-03-13T16:16:59.950000
3 posts
2 repos
Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability https://hackread.com/zyxel-devices-active-exploits-cve-2023-28771-vulnerability/
##Zyxel Devices Hit by Active Exploits Targeting CVE-2023-28771 Vulnerability https://hackread.com/zyxel-devices-active-exploits-cve-2023-28771-vulnerability/ #Cybersecurity #Vulnerability #CyberAttack #Security #Spoofing #Malware #Mirai #Zyxel #IoT
###Zyxel devices are under active attack via CVE-2023-28771. Researchers spotted a sudden spike in exploit attempts from 244 IPs, possibly tied to #Mirai botnet variants.
🔗 https://hackread.com/zyxel-devices-active-exploits-cve-2023-28771-vulnerability/
##updated 2025-01-29T18:38:40
1 posts
99 repos
https://github.com/kh4sh3i/Spring-CVE
https://github.com/nu0l/CVE-2022-22965
https://github.com/AabyssZG/SpringBoot-Scan
https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-Core-Rce
https://github.com/gpiechnik2/nmap-spring4shell
https://github.com/LudovicPatho/CVE-2022-22965_Spring4Shell
https://github.com/zangcc/CVE-2022-22965-rexbb
https://github.com/Wrin9/CVE-2022-22965
https://github.com/devengpk/CVE-2022-22965
https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965-
https://github.com/c33dd/CVE-2022-22965
https://github.com/ClemExp/CVE-2022-22965-PoC
https://github.com/brunoh6/web-threat-mitigation
https://github.com/mebibite/springhound
https://github.com/alt3kx/CVE-2022-22965
https://github.com/tpt11fb/SpringVulScan
https://github.com/e21-AS/telstra-cybersecurity-experience
https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCE
https://github.com/lcarea/CVE-2022-22965
https://github.com/me2nuk/CVE-2022-22965
https://github.com/t3amj3ff/Spring4ShellPoC
https://github.com/irgoncalves/irule-cve-2022-22965
https://github.com/Joe1sn/CVE-2022-22965
https://github.com/wshon/spring-framework-rce
https://github.com/netcode/Spring4shell-CVE-2022-22965-POC
https://github.com/FourCoreLabs/spring4shell-exploit-poc
https://github.com/ZapcoMan/spring4shell-vulnerable-application
https://github.com/GuayoyoCyber/CVE-2022-22965
https://github.com/TheGejr/SpringShell
https://github.com/fransvanbuul/CVE-2022-22965-susceptibility
https://github.com/alt3kx/CVE-2022-22965_PoC
https://github.com/Enokiy/spring-RCE-CVE-2022-22965
https://github.com/mariomamo/CVE-2022-22965
https://github.com/cxzero/CVE-2022-22965-spring4shell
https://github.com/likewhite/CVE-2022-22965
https://github.com/c4mx/CVE-2022-22965_PoC
https://github.com/fracturelabs/spring4shell_victim
https://github.com/helsecert/CVE-2022-22965
https://github.com/Aur3ns/Block-Spring4Shell
https://github.com/khulnasoft-lab/awesome-security
https://github.com/p1ckzi/CVE-2022-22965
https://github.com/xsxtw/SpringFramework_CVE-2022-22965_RCE
https://github.com/WuliRuler/SBSCAN
https://github.com/fracturelabs/go-scan-spring
https://github.com/liangyueliangyue/spring-core-rce
https://github.com/DDuarte/springshell-rce-poc
https://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965
https://github.com/ESSAFAR/Firewall-Rules
https://github.com/luoqianlin/CVE-2022-22965
https://github.com/DanielFEXKEX/CVE-Scanner
https://github.com/zer0yu/CVE-2022-22965
https://github.com/Qualys/spring4scanwin
https://github.com/BKLockly/CVE-2022-22965
https://github.com/Kirill89/CVE-2022-22965-PoC
https://github.com/mwojterski/cve-2022-22965
https://github.com/dbgee/Spring4Shell
https://github.com/0xr1l3s/CVE-2022-22965
https://github.com/Bouquets-ai/CVE-2022-22965-GUItools
https://github.com/iloveflag/Fast-CVE-2022-22965
https://github.com/jakabakos/CVE-2022-22965-Spring4Shell
https://github.com/LucasPDiniz/CVE-2022-22965
https://github.com/0xrobiul/CVE-2022-22965
https://github.com/delyee/Spring4Shell
https://github.com/CalumHutton/CVE-2022-22965-PoC_Payara
https://github.com/khidottrivi/CVE-2022-22965
https://github.com/colincowie/Safer_PoC_CVE-2022-22965
https://github.com/XuCcc/VulEnv
https://github.com/HackJava/Spring
https://github.com/west-wind/Spring4Shell-Detection
https://github.com/sunnyvale-it/CVE-2022-22965-PoC
https://github.com/itsecurityco/CVE-2022-22965
https://github.com/Loneyers/Spring4Shell
https://github.com/reznok/Spring4Shell-POC
https://github.com/BobTheShoplifter/Spring4Shell-POC
https://github.com/wikiZ/springboot_CVE-2022-22965
https://github.com/clemoregan/SSE4-CVE-2022-22965
https://github.com/daniel0x00/Invoke-CVE-2022-22965-SafeCheck
https://github.com/Snip3R69/spring-shell-vuln
https://github.com/datawiza-inc/spring-rec-demo
https://github.com/k3rwin/spring-core-rce
https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit
https://github.com/D1mang/Spring4Shell-CVE-2022-22965
https://github.com/irgoncalves/f5-waf-enforce-sig-Spring4Shell
https://github.com/SecNN/SpringFramework_CVE-2022-22965_RCE
https://github.com/snicoll-scratches/spring-boot-cve-2022-22965
https://github.com/Mr-xn/spring-core-rce
https://github.com/viniciuspereiras/CVE-2022-22965-poc
https://github.com/ajith737/Spring4Shell-CVE-2022-22965-POC
https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience-
https://github.com/guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965
https://github.com/anair-it/springshell-vuln-POC
https://github.com/sinjap/spring4shell
https://github.com/jashan-lefty/Spring4Shell
https://github.com/4nth0ny1130/spring4shell_behinder
https://github.com/te5t321/Spring4Shell-CVE-2022-22965.py
https://github.com/jschauma/check-springshell
An attacker downloaded a freely available webshell from GitHub and stored it under the installation path of the legitimate SAP installation in the recent SAP Visual Composer exploitation, "disguised" as a PHPMyAdmin file (see image).
The code itself is relatively simple, accepting a base64-encoded class via HTTP on a specified parameter, to dynamically load and run that class.
That type of Webshell, from the AntSwordProject [1], was also named by Mandiant last year in conjunction with an investigated APT41 intrusion, as well as in some reports from PaloAlto [2,3,4].
Given that most Linux servers are not equipped with an EDR or an AV, how would you detect such a webshell on your servers? The curated YARA rule from Florian Roth is a good starting point for hunting through your web and application folders to find hidden malicious files. [5] Velociraptor's Yara artifact is one example of how to accomplish this.
[1] https://github.com/AntSwordProject
[2] https://cloud.google.com/blog/topics/threat-intelligence/apt41-arisen-from-dust
[3] https://unit42.paloaltonetworks.com/cve-2022-22965-springshell/
[4] https://unit42.paloaltonetworks.com/actors-still-exploiting-sharepoint-vulnerability/
[5] https://raw.githubusercontent.com/Neo23x0/signature-base/a065133ff5763435e4e9e0f6bc72344c44b1824f/yara/gen_webshells.yar
updated 2025-01-14T03:31:48
2 posts
The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS scores: 6.0), were patched by SAP as part of its monthly updates for January 2025. https://thehackernews.com/2025/06/citrix-bleed-2-flaw-enables-token-theft.html
##These have been patched.
Pathlock: Responsible Disclosure: Vulnerabilities in SAP GUI Client (CVE-2025-0056 & CVE-2025-0055) https://pathlock.com/blog/security-alerts/cve-2025-0055-and-2025-0056/
More:
The Hacker News: Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure https://thehackernews.com/2025/06/citrix-bleed-2-flaw-enables-token-theft.html @thehackernews #cybersecurity #Infosec #Windows #Java
##updated 2025-01-14T03:31:48
2 posts
The vulnerabilities, tracked as CVE-2025-0055 and CVE-2025-0056 (CVSS scores: 6.0), were patched by SAP as part of its monthly updates for January 2025. https://thehackernews.com/2025/06/citrix-bleed-2-flaw-enables-token-theft.html
##These have been patched.
Pathlock: Responsible Disclosure: Vulnerabilities in SAP GUI Client (CVE-2025-0056 & CVE-2025-0055) https://pathlock.com/blog/security-alerts/cve-2025-0055-and-2025-0056/
More:
The Hacker News: Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure https://thehackernews.com/2025/06/citrix-bleed-2-flaw-enables-token-theft.html @thehackernews #cybersecurity #Infosec #Windows #Java
##updated 2024-12-23T20:38:21
1 posts
Woohoo! Another perfect 10 from last week. And this could hit hard. 🥳
https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Gogs is an open source self-hosted Git service. Prior to version 0.13.3, it's still possible to delete files under the .git directory and achieve remote command execution due to an insufficient patch for CVE-2024-39931. Unprivileged user accounts can execute arbitrary commands on the Gogs instance with the privileges of the account specified by RUN_USER in the configuration. Allowing attackers to access and alter any users' code hosted on the same instance. This issue has been patched in version 0.13.3.
updated 2024-06-27T12:30:43
2 posts
14 repos
https://github.com/bchevCH/CVE-2023-0386
https://github.com/EstamelGG/CVE-2023-0386-libs
https://github.com/sxlmnwb/CVE-2023-0386
https://github.com/puckiestyle/CVE-2023-0386
https://github.com/chenaotian/CVE-2023-0386
https://github.com/Satheesh575555/linux-4.19.72_CVE-2023-0386
https://github.com/churamanib/CVE-2023-0386
https://github.com/letsr00t/CVE-2023-0386
https://github.com/veritas501/CVE-2023-0386
https://github.com/orilevy8/cve-2023-0386
https://github.com/xkaneiki/CVE-2023-0386
https://github.com/Anekant-Singhai/Exploits
updated 2024-04-11T21:02:46
2 posts
3 repos
https://github.com/saladandonionrings/cve-2019-6693
New.
CISA has added to the KEV catalogue. The usual suspects are back.
- CVE-2024-54085: AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-54085
- CVE-2024-0769: D-Link DIR-859 Router Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-0769
- CVE-2019-6693: Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-6693 #cybersecurity #CISA #infosec
##CVE ID: CVE-2019-6693
Vendor: Fortinet
Product: FortiOS
Date Added: 2025-06-25
Notes: https://fortiguard.com/advisory/FG-IR-19-007 ; https://nvd.nist.gov/vuln/detail/CVE-2019-6693
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2019-6693
updated 2024-04-04T05:23:52
1 posts
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if needed
Scanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
##updated 2024-04-04T04:29:06
1 posts
11 repos
https://github.com/sfewer-r7/CVE-2023-34362
https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE
https://github.com/lithuanian-g/cve-2023-34362-iocs
https://github.com/aditibv/MOVEit-CVE-2023-34362
https://github.com/deepinstinct/MOVEit_CVE-2023-34362_IOCs
https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362
https://github.com/horizon3ai/CVE-2023-34362
https://github.com/kenbuckler/MOVEit-CVE-2023-34362
https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362
New mass scanning activity may be the first step in another MOVEit attack.
Hackers are actively scanning the internet for exposed MOVEit systems—hundreds of unique IPs every day—suggesting the early stages of coordinated exploitation.
Threat intel firm GreyNoise warns this is the same pattern seen weeks before past mass attacks. Known MOVEit vulnerabilities, such as CVE-2023-34362 and CVE-2023-36934, are already being tested in the wild.
If your MOVEit Transfer instance is online and unmonitored, you may already be on an attacker’s target list.
Now’s the time to:
• Patch all known MOVEit vulnerabilities
• Limit public-facing access
• Monitor for scan activity and open ports
• Block IPs identified by threat intelligence feeds
• Harden file transfer environments and deploy honeypots if needed
Scanning isn’t random—it’s reconnaissance. Act now before scanning turns into breach.
Read the article for details: https://www.cuinfosecurity.com/scans-probing-for-moveit-systems-may-be-precursor-to-attacks-a-28832
#MOVEit #Cybersecurity #MassScanning #ThreatIntel #AttackSurface #LMGSecurity #Infosec #ITsecurity #databreach #CISO #DFIR #pentesting #pentest #penetrationtesting
##updated 2024-01-21T09:30:39
2 posts
New.
CISA has added to the KEV catalogue. The usual suspects are back.
- CVE-2024-54085: AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-54085
- CVE-2024-0769: D-Link DIR-859 Router Path Traversal Vulnerability https://www.cve.org/CVERecord?id=CVE-2024-0769
- CVE-2019-6693: Fortinet FortiOS Use of Hard-Coded Credentials Vulnerability https://www.cve.org/CVERecord?id=CVE-2019-6693 #cybersecurity #CISA #infosec
##CVE ID: CVE-2024-0769
Vendor: D-Link
Product: DIR-859 Router
Date Added: 2025-06-25
Notes: https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10371 ; https://nvd.nist.gov/vuln/detail/CVE-2024-0769
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2024-0769
🛡️ CRITICAL CSRF vuln in LizardByte Sunshine (<2025.628.4510): attackers can trigger admin-level OS commands via web UI if users visit malicious links. Patch to 2025.628.4510+ ASAP! CVE-2025-53095 https://radar.offseq.com/threat/cve-2025-53095-cwe-352-cross-site-request-forgery--44568b1d #OffSeq #CSRF #Vulnerability #GameStreaming #PatchNow
##5 posts
5 repos
https://github.com/assad12341/notepad-v8.8.1-LPE-CVE-
https://github.com/tristanvandermeer/CVE-2025-49144-Test
https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC
CVE Record: CVE-2025-49144 - Notepad++ Privilege Escalation In Installer Via Uncontrolled Executable Search Path #SuggestedRead #devopsish https://www.cve.org/CVERecord?id=CVE-2025-49144
##CVE Record: CVE-2025-49144 - Notepad++ Privilege Escalation In Installer Via Uncontrolled Executable Search Path #SuggestedRead #devopsish https://www.cve.org/CVERecord?id=CVE-2025-49144
##Sales pitch toward the end.
Bitdefender: Notepad++ Vulnerability (CVE-2025-49144) Lets Attackers Take Full System Control; PoC Released https://www.bitdefender.com/en-us/blog/hotforsecurity/notepad-vulnerability-lets-attackers-take-full-system-control-poc-released #cybersecurity #infosec
##Flaw in Notepad++ installer could grant attackers SYSTEM access (CVE-2025-49144) https://www.helpnetsecurity.com/2025/06/25/flaw-in-notepad-installer-could-grant-attackers-system-access-cve-2025-49144/ #vulnerability #opensource #Don'tmiss #Hotstuff #News #PoC
##Une faille dans Notepad++ menace Windows : un exploit PoC est disponible ! https://www.it-connect.fr/notepad-plus-plus-cve-2025-49144-faille-windows/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##What the NULL?! Wing FTP Server RCE (CVE-2025-47812) https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/
##Oh my. Perfect 10 ../ in a KVM server management panel.
https://github.com/ConvoyPanel/panel/security/advisories/GHSA-43g3-qpwq-hfgg
sev:CRIT 10.0 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
##Convoy is a KVM server management panel for hosting businesses. In versions 3.9.0-rc3 to before 4.4.1, there is a directory traversal vulnerability in the LocaleController component of Performave Convoy. An unauthenticated remote attacker can exploit this vulnerability by sending a specially crafted HTTP request with malicious locale and namespace parameters. This allows the attacker to include and execute arbitrary PHP files on the server. This issue has been patched in version 4.4.1. A temporary workaround involves implementing strict Web Application Firewall (WAF) rules to incoming requests targeting the vulnerable endpoints.
I know a bunch of you nerds like playing with ESP32s, etc.
sev:HIGH 8.7 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
##ESPAsyncWebServer is an asynchronous HTTP and WebSocket server library for ESP32, ESP8266, RP2040 and RP2350. In versions up to and including 3.7.8, a CRLF (Carriage Return Line Feed) injection vulnerability exists in the construction and output of HTTP headers within
AsyncWebHeader.cpp. Unsanitized input allows attackers to inject CR (\r) or LF (\n) characters into header names or values, leading to arbitrary header or response manipulation. Manipulation of HTTP headers and responses can enable a wide range of attacks, making the severity of this vulnerability high. A fix is available at pull request 211 and is expected to be part of version 3.7.9.
⚠️ CRITICAL: CVE-2025-53091 impacts WeGIA <=3.3.3. Unauth time-based blind SQLi in 'almox' param of /controle/getProdutosPorAlmox.php—easy remote exploit, data at risk! Patch to 3.4.0+ ASAP. https://radar.offseq.com/threat/cve-2025-53091-cwe-89-improper-neutralization-of-s-ca59ad97 #OffSeq #SQLInjection #CVE202553091 #FOSS #CharitySecurity
##AMD posted this yesterday, relating to CVE-2024-21969: "Improper clearing of GPU registers could allow a malicious shader to read left-over pixel data leading to loss of confidentiality."
AMD: Uninitialized GPU Register Access, medium severity https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6013.html #cybersecurity #infosec #AMD
##Remote code execution in CentOS Web Panel - CVE-2025-48703 https://fenrisk.com/rce-centos-webpanel
##Pre-auth RCE in CentOS Web Panel (CVE-2025-48703) found by the friends at Fenrisk. This is beyond madness that Shodan finds 200k of these exposed publicly.
(this post is sponsored by strace®, because no one cares about ionCube)
##Two new Linux flaws (CVE-2025-6018, CVE-2025-6019) allow local attackers to escalate to root via PAM misconfig and udisks. Exploits confirmed on Ubuntu, Fedora, Debian. Admins urged to patch immediately.
##Critical cryptographic flaw in Meshtastic Mesh Networking platform exposes private communications
Meshtastic, an open-source mesh networking solution for off-grid communication, has patched a critical vulnerability (CVE-2025-52464) that allowed attackers to decrypt private messages and hijack remote device administration due to identical cryptographic keys being shipped by manufacturers and poor randomness initialization. Users are urged to update to firmware version 2.6.11 or later and perform factory resets to eliminate potentially compromised keys.
**If you have Meshtastic devices, check the firmware. If it's 2.5.0 and above, it's very wise to update to firmware version 2.6.11 or later. Because attackers can read your private messages and take control of your devices. If possible, patch directly or reach out to your device manufacturer for a patch. After updating, perform a factory reset using "meshtastic --factory-reset-device" to clean up the old and potentially compromised encryption keys.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-cryptographic-flaw-in-meshtastic-mesh-networking-platform-exposes-private-communications-a-x-6-u-s/gD2P6Ple2L